2017
DOI: 10.1007/978-3-319-64647-3_4
|View full text |Cite
|
Sign up to set email alerts
|

Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(22 citation statements)
references
References 22 publications
0
22
0
Order By: Relevance
“…Results It is difficult to compare these results to state-of-the-art masked AES implementations [5,21,31,61] since they target an ASIC platform. We can let Xilinx map these designs to Spartan-6 resources, but unlike our design, they have not been optimized specifically for this purpose.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Results It is difficult to compare these results to state-of-the-art masked AES implementations [5,21,31,61] since they target an ASIC platform. We can let Xilinx map these designs to Spartan-6 resources, but unlike our design, they have not been optimized specifically for this purpose.…”
Section: Methodsmentioning
confidence: 99%
“…This S-box implementation is the smallest to date. These S-box designs have all been successfully used to create the stateof-the-art smallest masked AES implementations [5,21,31,61]. However, when it comes to look-up table (LUT)-based FPGA implementations, these optimized constructions do not perform better than the 8 slices that are required for any 8-bit to 8-bit mapping such as the AES S-box.…”
Section: Aes S-boxmentioning
confidence: 99%
“…Our approach is thus radically different. We cannot compare easily with [UHA17] because of different synthesis libraries, though they seem to have a similar area footprint for larger randomness requirement (64 bits per S-box). Also, they only provide a first-order implementation.…”
Section: Implementation Costmentioning
confidence: 99%
“…The similarities and differences between TI and the Private Circuits scheme [ISW03], which provides provable security if the circuit behaves ideally (no glitches), were analysed by Reparaz et [GMK16], which is also related to the original Private Circuits scheme [ISW03] with additional registers againts glitches and a different randomness consumption. These masking schemes have all been applied to Canright's tower-field AES S-box [Can05] due to its small foot-print and structure, resulting in a multitude of masked AES implementations [MPL + 11, BGN + 14b, CRB + 16, GMK17,UHA17]. Those of Ueno et al [UHA17], De Cnudde et al [CRB + 16] and Gross et al [GMK17] are the smallest to date, with the latter requiring much less randomness.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation