International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious direction is to use various masking or hiding countermeasures. However, such schemes come with a cost, e.g. an increase in the area and/or reduction of the speed. When considering lightweight cryptography and various constrained environments, the situation becomes even more difficult due to numerous implementation restrictions. However, some options are possible like using S-boxes that are easier to mask or (more on a fundamental level), using S-boxes that possess higher inherent side-channel resilience. In this paper we investigate what properties should an S-box possess in order to be more resilient against side-channel attacks. Moreover, ...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
New criteria of extended resiliency and extended immunity of vectorial Boolean functions, such as S-...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
Side-channel attacks exploit physical characteristics of implementations of cryptographic algorithms...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
Masking schemes represent a well-researched and successful option to follow when considering side-ch...
Side-channel attacks represent a powerful category of attacks against cryptographic devices. Still, ...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
Side-channel attacks represent a powerful category of attacks against cryptographic devices. Still, ...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
New criteria of extended resiliency and extended immunity of vectorial Boolean functions, such as S-...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
Side-channel attacks exploit physical characteristics of implementations of cryptographic algorithms...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
Masking schemes represent a well-researched and successful option to follow when considering side-ch...
Side-channel attacks represent a powerful category of attacks against cryptographic devices. Still, ...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
Side-channel attacks represent a powerful category of attacks against cryptographic devices. Still, ...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
International audienceSide-channel attacks represent a powerful category of attacks against cryptogr...
New criteria of extended resiliency and extended immunity of vectorial Boolean functions, such as S-...