2020
DOI: 10.1007/978-3-030-56784-2_13
|View full text |Cite
|
Sign up to set email alerts
|

Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 26 publications
(18 citation statements)
references
References 78 publications
0
15
0
Order By: Relevance
“…We summarize and discuss implementation security and efficient implementations in Sect. 7. Finally, we conclude in Sect.…”
Section: Introductionmentioning
confidence: 85%
See 3 more Smart Citations
“…We summarize and discuss implementation security and efficient implementations in Sect. 7. Finally, we conclude in Sect.…”
Section: Introductionmentioning
confidence: 85%
“…As a result, masked software implementations of Ascon result in a performance penalty with low overhead. Additionally, leveled implementations of Ascon are possible to improve the robustness and/or security of the design [4,7]. Examples are side-channel protected implementations with different strength of the key XORs, p a and/or p b .…”
Section: Implementation Security and Robustnessmentioning
confidence: 99%
See 2 more Smart Citations
“…Related Work. Two NIST LWC finalists, Ascon [21] and ISAP [22], have been shown to have nonce-misuse resilient privacy and misuse resistant authenticity [23,24]. NMRL security has been shown for a 2nd-round candidate Spook [25].…”
Section: Introductionmentioning
confidence: 99%