IoT devices have very strong requirements on all the resources such as memory, randomness, energy and execution time. This paper proposes a number of scalable shuffling techniques as countermeasures against side channel analysis. Some extensions of an existing technique called Random Start Index (RSI) are suggested in this paper. Moreover, two new shuffling techniques Reverse Shuffle (RS) and Sweep Swap Shuffle (SSS) are described within their possible extensions. Extensions of RSI, RS and SSS might be implemented in a constrained environment with a small data and time overhead. Each of them might be implemented using different amount of randomness and thus, might be fine-tuned according to requirements and constraints of a cryptographic sy...
The Number Theoretic Transform (NTT) is a major building block in recently introduced lattice based ...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
This paper provides the first verifiable shuffle specifically for fully homomorphic schemes. A verif...
Together with masking, shuffling is one of the most frequently considered solutions to improve the s...
Abstract. Together with masking, shuffling is one of the most fre-quently considered solutions to im...
Abstract—Side-channel attacks have been a real threat against many critical embedded systems that re...
We revisit the popular adage that side-channel countermeasures must be combined to be efficient, and...
Hiding countermeasures are the most widely utilized techniques for thwarting side-channel attacks, a...
This papers studies methods to improve the cryptographic quality of random or pseudorandom sequence...
International audienceIn this paper, we present a lightweight secured AES hardware implementation de...
The modern, always-online world relies on numerous electronic devices. Ensuring the unobstructed ope...
Abstract—Shuffling is an effective method to build a publicly verifiable mix network to implement ve...
In this paper, we propose further performance improvements for Wikström’s shuffle proof. Compared to...
Combining countermeasures is usually assumed to be the best way to protect embedded devices against ...
Single-trace side-channel attacks are important attack vectors against the security of authenticated...
The Number Theoretic Transform (NTT) is a major building block in recently introduced lattice based ...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
This paper provides the first verifiable shuffle specifically for fully homomorphic schemes. A verif...
Together with masking, shuffling is one of the most frequently considered solutions to improve the s...
Abstract. Together with masking, shuffling is one of the most fre-quently considered solutions to im...
Abstract—Side-channel attacks have been a real threat against many critical embedded systems that re...
We revisit the popular adage that side-channel countermeasures must be combined to be efficient, and...
Hiding countermeasures are the most widely utilized techniques for thwarting side-channel attacks, a...
This papers studies methods to improve the cryptographic quality of random or pseudorandom sequence...
International audienceIn this paper, we present a lightweight secured AES hardware implementation de...
The modern, always-online world relies on numerous electronic devices. Ensuring the unobstructed ope...
Abstract—Shuffling is an effective method to build a publicly verifiable mix network to implement ve...
In this paper, we propose further performance improvements for Wikström’s shuffle proof. Compared to...
Combining countermeasures is usually assumed to be the best way to protect embedded devices against ...
Single-trace side-channel attacks are important attack vectors against the security of authenticated...
The Number Theoretic Transform (NTT) is a major building block in recently introduced lattice based ...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
This paper provides the first verifiable shuffle specifically for fully homomorphic schemes. A verif...