2017
DOI: 10.1007/978-3-319-64647-3_7
|View full text |Cite
|
Sign up to set email alerts
|

On the Construction of Side-Channel Attack Resilient S-boxes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 26 publications
0
6
0
Order By: Relevance
“…Finally, we hope that our work will be followed by some interesting further research works. Among them, experiments should be performed on protected implementation and on different machine architectures [27][28][29][30][31]. The principal component analysis (PCA) could also be used to enhance our strategies [32].…”
Section: Resultsmentioning
confidence: 99%
“…Finally, we hope that our work will be followed by some interesting further research works. Among them, experiments should be performed on protected implementation and on different machine architectures [27][28][29][30][31]. The principal component analysis (PCA) could also be used to enhance our strategies [32].…”
Section: Resultsmentioning
confidence: 99%
“…Menyachikhin (2017) presented the spectral-linear and spectral differential techniques for constructing s-boxes consisting of near-optimal security features of s-boxes [28], wherein, they used the information from linear approximation table and differential spectrum of s-boxes to improve the properties of resulting s-boxes. Lerman et al are assisted by genetic algorithms in the generation of side-channel attacks robust s-boxes of small dimensions [29]. Martínez-Díaz works with local search algorithms to evolve s-boxes with improved side-channel resistivity having good values of nonlinearity [30].…”
Section: Related Workmentioning
confidence: 99%
“…Appendix A. Some Substitution Boxes with the Best Nonlinearity Achieved S 5 ={7, 12,21,29,17,23,10,26,31,16,27,30,28,3,5,15,8,18,1,19,9,2,11,25,4,0,6,20,22,24,13, 14} S 6 ={28, 17, 1, 13, 38, 41, 46, 6, 0, 29, 53, 20, 59, 5, 24, 21, 35, 26, 61, 16, 48, 37, 58, 22, 55, 44, 39, 56, 34, 43,…”
Section: Appendix B Pseudo-code Of the Local Search Algorithmmentioning
confidence: 99%
“…We note that other considerations could be incorporated in addition to the ones mentioned in this section, such as side-channel attacks resilient criteria [29], but we believe this falls out of the scope of our research that tries to focus on natural immunity to DFA.…”
Section: Selection Of the Default Sboxesmentioning
confidence: 99%