Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/102051
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kutzner, Sebastian | en |
dc.contributor.author | Nguyen, Phuong Ha | en |
dc.contributor.author | Poschmann, Axel | en |
dc.date.accessioned | 2014-02-27T04:26:36Z | en |
dc.date.accessioned | 2019-12-06T20:48:49Z | - |
dc.date.available | 2014-02-27T04:26:36Z | en |
dc.date.available | 2019-12-06T20:48:49Z | - |
dc.date.copyright | 2012 | en |
dc.date.issued | 2012 | en |
dc.identifier.citation | Kutzner, S., Nguyen, P. H., & Poschmann, A. (2012). Enabling 3-share Threshold Implementations for all 4-bit S-boxes. Cryptology ePrint Archive, 2012/510. | en |
dc.identifier.uri | https://hdl.handle.net/10356/102051 | - |
dc.description.abstract | Threshold Implementation (TI) is an elegant and widely accepted countermeasure against 1-st order Differential Power Analysis (DPA) in Side Channel Attacks. The 3-share TI is the most efficient version of TI, but so far, it can only be applied to 50\% of all 4-bit S-boxes. In this paper, we study the limitations of decomposition and introduce factorization to enable the 3-share TI for any optimal 4-bit S-box. We propose an algorithm which can decompose any optimal 4-bit S-box to quadratic vectorial boolean functions with a time complexity of $2^{19}$. Furthermore, we use our new methodology in combination with decomposition to optimize ciphers utilizing many different S-boxes, and, to highlight the strength of our new methodology, we construct a 3-share Threshold Implementation of SERPENT which was believed to be not possible until now. Last, we show how to implemented all SERPENT S-boxes with only one mutual core. | en |
dc.language.iso | en | en |
dc.rights | © 2012 The Author(s). This is the author created version of a work that has been peer reviewed and accepted for publication by Cryptology ePrint Archive, IACR. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [URL:http://eprint.iacr.org/2012/510]. | en |
dc.subject | DRNTU::Science::Mathematics | en |
dc.title | Enabling 3-share threshold implementations for all 4-bit S-boxes | en |
dc.type | Conference Paper | en |
dc.contributor.school | School of Physical and Mathematical Sciences | en |
dc.contributor.conference | Cryptology ePrint Archive | en |
dc.contributor.research | Temasek Laboratories | en |
dc.description.version | Accepted version | en |
dc.identifier.url | http://eprint.iacr.org/2012/510 | en |
dc.identifier.rims | 175085 | en |
item.grantfulltext | open | - |
item.fulltext | With Fulltext | - |
Appears in Collections: | SPMS Conference Papers |
Page view(s) 50
553
Updated on Jun 4, 2023
Download(s) 5
410
Updated on Jun 4, 2023
Google ScholarTM
Check
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.