2020
DOI: 10.1007/978-3-030-64837-4_26
|View full text |Cite
|
Sign up to set email alerts
|

SILVER – Statistical Independence and Leakage Verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
52
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 48 publications
(58 citation statements)
references
References 43 publications
3
52
0
Order By: Relevance
“…As an outcome of our research, we provide three-share second-order glitch-extended probing-secure implementations of Keccak with no fresh randomness and the S-box of SKINNY, Midori, PRESENT, and PRINCE ciphers using only 8-bit fresh masks per clock cycle. We would like to highlight that we confirm the second-order security of our constructions by SILVER [KSM20] under glitch-extended probing model and by FPGA-based practical experiments. Our programs as well as the hardware implementations (HDL codes) are fully provided in the GitHub.…”
Section: Our Contributionssupporting
confidence: 74%
See 2 more Smart Citations
“…As an outcome of our research, we provide three-share second-order glitch-extended probing-secure implementations of Keccak with no fresh randomness and the S-box of SKINNY, Midori, PRESENT, and PRINCE ciphers using only 8-bit fresh masks per clock cycle. We would like to highlight that we confirm the second-order security of our constructions by SILVER [KSM20] under glitch-extended probing model and by FPGA-based practical experiments. Our programs as well as the hardware implementations (HDL codes) are fully provided in the GitHub.…”
Section: Our Contributionssupporting
confidence: 74%
“…Hence, 8-bit r 2 used for the second composition of the first S-box is re-used by the first stage of the second S-box. After synthesizing the circuit, which receives 24 fresh mask bits and an 8-bit input and provides an 8-bit output (both shared with three shares), we gave the corresponding netlist to SILVER [KSM20], which confirmed its second-order security under glitch-extended probing model and uniformity of its output sharing. Note that this optimization is possible since each function F , G and H is individually second-order glitch-extended probing secure with uniform output sharing, and the fresh masks are only used to avoid multivariate leakages with respect to probes places on different functions.…”
Section: Fresh Mask-reuse In Prince S-boxmentioning
confidence: 78%
See 1 more Smart Citation
“…Compared to state of the art, it is the only design with such a low latency at higher orders while keeping the number of shares at minimum, leading to smaller area overhead. The security of our new approach and the generic design is verified in two ways: first, using the recently-introduced verification tool SILVER [KSM20] under the glitch-extended probing model, and second, by FPGA-based experimental evaluations, namely the Welch's t-test.…”
Section: Our Contributionsmentioning
confidence: 99%
“…Since our main focus in this paper is hardware implementation of masking schemes, we consider such a glitch-extended probing model in our designs and evaluations. To this end, we further use the recently-introduced open-source verification tool SILVER [KSM20] under robust probing model to assess the security of our constructions.…”
Section: Probing Securitymentioning
confidence: 99%