The effort in reducing the area of AES implementations has largely been focused on application-specific integrated circuits (ASICs) in which a tower field construction leads to a small design of the AES S-box. In contrast, a naive implementation of the AES S-box has been the status-quo on field-programmable gate arrays (FPGAs). A similar discrepancy holds for masking schemes—a well-known side-channel analysis countermeasure—which are commonly optimized to achieve minimal area in ASICs. In this paper, we demonstrate a representation of the AES S-box exploiting rotational symmetry which leads to a 50% reduction in the area footprint on FPGA devices. We present new AES implementations which improve on the state-of-the-art and explore various t...
Abstract—This paper presents hardware implementations of a DES cryptoprocessor with masking counterm...
This paper proposes a compact AES algorithm to achieve less slice consumption of FPGA. Proposed desi...
Abstract. Implementations of the Advanced Encryption Standard (AES), including hardware applications...
The effort in reducing the area of AES implementations has largely been focused on application-speci...
The effort in reducing the area of AES implementations has largely been focused on Application-Speci...
Power analysis attacks are a serious treat for implementations of modern cryptographic algorithms. M...
Being based on a sound theoretical basis, masking schemes are commonly applied to protect cryptograp...
Abstract. Power analysis attacks are a serious treat for implementations of mod-ern cryptographic al...
Abstract. Power analysis attacks are a serious treat for implementations of mod-ern cryptographic al...
Polynomial masking is a higher-order and glitch-resistant masking scheme to protect cryptographic im...
Hardware masked AES designs usually rely on Boolean masking and perform the computation of the S-box...
Cryptographic devices in hostile environments can be vulnerable to physical attacks such as power an...
In this work, we present RAMBAM, a novel concept of designing countermeasures against side-channel a...
Passive physical attacks, like power analysis, pose a serious threat to the security of digital circ...
We provide three first-order hardware maskings of the AES, each allowing for a different trade-off b...
Abstract—This paper presents hardware implementations of a DES cryptoprocessor with masking counterm...
This paper proposes a compact AES algorithm to achieve less slice consumption of FPGA. Proposed desi...
Abstract. Implementations of the Advanced Encryption Standard (AES), including hardware applications...
The effort in reducing the area of AES implementations has largely been focused on application-speci...
The effort in reducing the area of AES implementations has largely been focused on Application-Speci...
Power analysis attacks are a serious treat for implementations of modern cryptographic algorithms. M...
Being based on a sound theoretical basis, masking schemes are commonly applied to protect cryptograp...
Abstract. Power analysis attacks are a serious treat for implementations of mod-ern cryptographic al...
Abstract. Power analysis attacks are a serious treat for implementations of mod-ern cryptographic al...
Polynomial masking is a higher-order and glitch-resistant masking scheme to protect cryptographic im...
Hardware masked AES designs usually rely on Boolean masking and perform the computation of the S-box...
Cryptographic devices in hostile environments can be vulnerable to physical attacks such as power an...
In this work, we present RAMBAM, a novel concept of designing countermeasures against side-channel a...
Passive physical attacks, like power analysis, pose a serious threat to the security of digital circ...
We provide three first-order hardware maskings of the AES, each allowing for a different trade-off b...
Abstract—This paper presents hardware implementations of a DES cryptoprocessor with masking counterm...
This paper proposes a compact AES algorithm to achieve less slice consumption of FPGA. Proposed desi...
Abstract. Implementations of the Advanced Encryption Standard (AES), including hardware applications...