2021
DOI: 10.46586/tches.v2021.i4.388-411
|View full text |Cite
|
Sign up to set email alerts
|

Low-Latency Keccak at any Arbitrary Order

Abstract: Correct application of masking on hardware implementation of cryptographic primitives necessitates the instantiation of registers in order to achieve the non-completeness (commonly said to stop the propagation of glitches). This sometimes leads to a high latency overhead, making the implementation not necessarily suitable for the underlying application. As a concrete example, this holds for Keccak. Application of d + 1 Domain Oriented Masking (DOM) on a round-based implementation of Keccak leads to the introdu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 12 publications
(17 reference statements)
0
2
0
Order By: Relevance
“…In particular, we perform non-specific fixed versus random t-tests, where we aim to determine the validity of the null hypothesis that encryptions with a fixed and uniformly sampled plaintext admit the same mean power consumption (i.e., are indistinguishable under first-order statistical analysis). Following the state of the art [1,24,30], we set a threshold |t| > 4.5 for any t-value to reject the null hypothesis.…”
Section: T-testsmentioning
confidence: 99%
“…In particular, we perform non-specific fixed versus random t-tests, where we aim to determine the validity of the null hypothesis that encryptions with a fixed and uniformly sampled plaintext admit the same mean power consumption (i.e., are indistinguishable under first-order statistical analysis). Following the state of the art [1,24,30], we set a threshold |t| > 4.5 for any t-value to reject the null hypothesis.…”
Section: T-testsmentioning
confidence: 99%
“…In particular, we perform non-specific fixed versus random t-tests, where we aim to determine the validity of the null hypothesis that encryptions with a fixed and uniformly sampled plaintext admit the same mean power consumption (i.e., are indistinguishable under first-order statistical analysis). Following the state of the art [1,24,30], we set a threshold |t| > 4.5 for any t-value to reject the null hypothesis.…”
Section: T-testsmentioning
confidence: 99%