Hardware masked AES designs usually rely on Boolean masking and perform the computation of the S-box using the tower-field decomposition. On the other hand, splitting sensitive variables in a multiplicative way is more amenable for the computation of the AES S-box, as noted by Akkar and Giraud. However, multiplicative masking needs to be implemented carefully not to be vulnerable to first-order DPA with a zero-value power model. Up to now, sound higher-order multiplicative masking schemes have been implemented only in software. In this work, we demonstrate the first hardware implementation of AES using multiplicative masks. The method is tailored to be secure even if the underlying gates are not ideal and glitches occur in the circuit. We d...
Abstract. Power analysis attacks are a serious treat for implementations of mod-ern cryptographic al...
In this work, we present RAMBAM, a novel concept of designing countermeasures against side-channel a...
Power analysis attacks are a serious treat for implementations of modern cryptographic algorithms. M...
Being based on a sound theoretical basis, masking schemes are commonly applied to protect cryptograp...
© International Association for Cryptologic Research 2016. Masking requires splitting sensitive vari...
Polynomial masking is a higher-order and glitch-resistant masking scheme to protect cryptographic im...
The effort in reducing the area of AES implementations has largely been focused on application-speci...
The effort in reducing the area of AES implementations has largely been focused on application-speci...
Cryptographic devices in hostile environments can be vulnerable to physical attacks such as power an...
We provide three first-order hardware maskings of the AES, each allowing for a different trade-off b...
During the past two decades there has been a great deal of research published on masked hardware imp...
International audiencePassive physical attacks represent a threat to microelectronics systems by exp...
The effort in reducing the area of AES implementations has largely been focused on Application-Speci...
International audiencePassive physical attacks represent a threat to microelectronics systems by exp...
International audiencePassive physical attacks represent a threat to microelectronics systems by exp...
Abstract. Power analysis attacks are a serious treat for implementations of mod-ern cryptographic al...
In this work, we present RAMBAM, a novel concept of designing countermeasures against side-channel a...
Power analysis attacks are a serious treat for implementations of modern cryptographic algorithms. M...
Being based on a sound theoretical basis, masking schemes are commonly applied to protect cryptograp...
© International Association for Cryptologic Research 2016. Masking requires splitting sensitive vari...
Polynomial masking is a higher-order and glitch-resistant masking scheme to protect cryptographic im...
The effort in reducing the area of AES implementations has largely been focused on application-speci...
The effort in reducing the area of AES implementations has largely been focused on application-speci...
Cryptographic devices in hostile environments can be vulnerable to physical attacks such as power an...
We provide three first-order hardware maskings of the AES, each allowing for a different trade-off b...
During the past two decades there has been a great deal of research published on masked hardware imp...
International audiencePassive physical attacks represent a threat to microelectronics systems by exp...
The effort in reducing the area of AES implementations has largely been focused on Application-Speci...
International audiencePassive physical attacks represent a threat to microelectronics systems by exp...
International audiencePassive physical attacks represent a threat to microelectronics systems by exp...
Abstract. Power analysis attacks are a serious treat for implementations of mod-ern cryptographic al...
In this work, we present RAMBAM, a novel concept of designing countermeasures against side-channel a...
Power analysis attacks are a serious treat for implementations of modern cryptographic algorithms. M...