Modular addition is an important component of many cryptographic algorithms such as ARX-ciphers and lattice-based post-quantum secure schemes. In order to protect devices that execute these algorithms against side-channel attacks, countermeasures such as masking must be applied. However, if an implementation needs to be secured against multivariate attacks, univariately secure masking schemes do not suffice. In this work, we focus on hardware architectures for higher-order masked addition circuits. We present and discuss three adder designs that are protected with a provably secure masking scheme. Concretely, we discuss Kogge–Stone, Sklansky and Brent–Kung adders regarding their suitability for high-order masking and their performance in th...
Masking is a very common countermeasure against side channel attacks. When combining Boolean and ari...
In this paper we investigate relations between several masking schemes. We show that the Ishai--Saha...
Hardware masked AES designs usually rely on Boolean masking and perform the computation of the S-box...
Modular addition is an important component of many cryptographic algorithms such as ARX-ciphers and ...
The current state of the art of Boolean masking for the modular addition operation in software has a...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
peer reviewedA general technique to protect a cryptographic algorithm against side-channel attacks c...
The performance of higher-order masked implementations of lattice-based based key encapsulation mech...
In this paper, we optimize the performances and compare several recent masking schemes in bitslice o...
Masking is a widely-used technique to protect block ciphers and other symmetric cryptosystems agains...
Research on the design of masked cryptographic hardware circuits in the past has mostly focused on r...
With an increasing number of mobile devices and their high accessibility, protecting the implementat...
The performance of higher-order masked implementations of lattice-based based key encapsulation mech...
Abstract. The masking countermeasure is an efficient method to pro-tect cryptographic algorithms aga...
The performance of higher-order masked implementations of lattice-based based key encapsulation mech...
Masking is a very common countermeasure against side channel attacks. When combining Boolean and ari...
In this paper we investigate relations between several masking schemes. We show that the Ishai--Saha...
Hardware masked AES designs usually rely on Boolean masking and perform the computation of the S-box...
Modular addition is an important component of many cryptographic algorithms such as ARX-ciphers and ...
The current state of the art of Boolean masking for the modular addition operation in software has a...
Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implemen...
peer reviewedA general technique to protect a cryptographic algorithm against side-channel attacks c...
The performance of higher-order masked implementations of lattice-based based key encapsulation mech...
In this paper, we optimize the performances and compare several recent masking schemes in bitslice o...
Masking is a widely-used technique to protect block ciphers and other symmetric cryptosystems agains...
Research on the design of masked cryptographic hardware circuits in the past has mostly focused on r...
With an increasing number of mobile devices and their high accessibility, protecting the implementat...
The performance of higher-order masked implementations of lattice-based based key encapsulation mech...
Abstract. The masking countermeasure is an efficient method to pro-tect cryptographic algorithms aga...
The performance of higher-order masked implementations of lattice-based based key encapsulation mech...
Masking is a very common countermeasure against side channel attacks. When combining Boolean and ari...
In this paper we investigate relations between several masking schemes. We show that the Ishai--Saha...
Hardware masked AES designs usually rely on Boolean masking and perform the computation of the S-box...