This work focuses on side-channel resilient design strategies for symmetrickey cryptographic primitives targeting lightweight applications. In light of NIST’s lightweight cryptography project, design choices for block ciphers must consider not only security against traditional cryptanalysis, but also side-channel security, while adhering to low area and power requirements. In this paper, we explore design strategies for substitution-permutation network (SPN)-based block ciphers that make them amenable to low-cost threshold implementations (TI) - a provably secure strategy against side-channel attacks. The core building blocks for our strategy are cryptographically optimal 4×4 S-Boxes, implemented via repeated iterations of simple cellular a...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
This work focuses on side-channel resilient design strategies for symmetrickey cryptographic primiti...
This work focuses on side-channel resilient design strategies for symmetrickey cryptographic primiti...
This work focuses on side-channel resilient design strategies for symmetrickey cryptographic primiti...
Lightweight cryptography has been a rising topic along with the global development of very constrain...
Lightweight cryptography has been a rising topic along with the global development of very constrain...
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, ...
Threshold Implementations have become a popular generic technique to construct circuits resilient ag...
Cellular Automata (CA) represent an interesting approach to design Substitution Boxes (S-boxes) havi...
Cellular Automata (CA) represent an interesting approach to design SubstitutionBoxes (S-boxes) havin...
Cellular Automata (CA) represent an interesting approach to design SubstitutionBoxes (S-boxes) havin...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
This work focuses on side-channel resilient design strategies for symmetrickey cryptographic primiti...
This work focuses on side-channel resilient design strategies for symmetrickey cryptographic primiti...
This work focuses on side-channel resilient design strategies for symmetrickey cryptographic primiti...
Lightweight cryptography has been a rising topic along with the global development of very constrain...
Lightweight cryptography has been a rising topic along with the global development of very constrain...
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, ...
Threshold Implementations have become a popular generic technique to construct circuits resilient ag...
Cellular Automata (CA) represent an interesting approach to design Substitution Boxes (S-boxes) havi...
Cellular Automata (CA) represent an interesting approach to design SubstitutionBoxes (S-boxes) havin...
Cellular Automata (CA) represent an interesting approach to design SubstitutionBoxes (S-boxes) havin...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...
International audienceWhen discussing how to improve side-channel resilience of a cipher, an obvious...