Please use this identifier to cite or link to this item:
|Title:||On 3-share threshold implementations for 4-Bit S-boxes||Authors:||Kutzner, Sebastian
Nguyen, Phuong Ha
|Keywords:||DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks||Issue Date:||2013||Source:||Kutzner, S., Nguyen, P. H., Poschmann, A., & Wang, H. (2013). On 3-Share Threshold Implementations for 4-Bit S-boxes. 4th International Workshop, Constructive Side-Channel Analysis and Secure Design (COSADE) 2013, 7864, pp.99-113.||Abstract:||One of the most promising lightweight hardware countermeasures against SCA attacks is the so-called Threshold Implementation (TI)  countermeasure. In this work we discuss issues towards its applicability and introduce solutions to boost its implementation efficiency. In particular, our contribution is three-fold: first we introduce two methodologies to efficiently implement 3-share TI to a given S-box. Second, as an example, we successfully apply these methodologies to PRESENT and are able to decrease the area requirements of its protected S-box by 37-40%. Third, we present the first successful practical Mutual Information Attack on the original 3-share TI implementation of PRESENT and compare it with a correlation-enhanced collision attack using second-order moments.||URI:||https://hdl.handle.net/10356/99651
|DOI:||http://dx.doi.org/10.1007/978-3-642-40026-1_7||Rights:||© 2013 Springer-Verlag Berlin Heidelberg. This is the author created version of a work that has been peer reviewed and accepted for publication by 4th International Workshop, Constructive Side-Channel Analysis and Secure Design (COSADE) 2013, Springer-Verlag Berlin Heidelberg. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [http://dx.doi.org/10.1007/978-3-642-40026-1_7].||Fulltext Permission:||open||Fulltext Availability:||With Fulltext|
|Appears in Collections:||SPMS Conference Papers|
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.