Conference paper Open Access

Higher-Order Threshold Implementation of the AES S-Box

De Cnudde, Thomas; Bilgin, Begül; Reparaz, Oscar; Nikov, Ventzislav; Nikova, Svetla


DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
  <identifier identifierType="DOI">10.5281/zenodo.58086</identifier>
  <creators>
    <creator>
      <creatorName>De Cnudde, Thomas</creatorName>
      <givenName>Thomas</givenName>
      <familyName>De Cnudde</familyName>
      <affiliation>KU Leuven</affiliation>
    </creator>
    <creator>
      <creatorName>Bilgin, Begül</creatorName>
      <givenName>Begül</givenName>
      <familyName>Bilgin</familyName>
      <affiliation>KU Leuven</affiliation>
    </creator>
    <creator>
      <creatorName>Reparaz, Oscar</creatorName>
      <givenName>Oscar</givenName>
      <familyName>Reparaz</familyName>
      <affiliation>KU Leuven</affiliation>
    </creator>
    <creator>
      <creatorName>Nikov, Ventzislav</creatorName>
      <givenName>Ventzislav</givenName>
      <familyName>Nikov</familyName>
      <affiliation>NXP Semiconductors, Leuven</affiliation>
    </creator>
    <creator>
      <creatorName>Nikova, Svetla</creatorName>
      <givenName>Svetla</givenName>
      <familyName>Nikova</familyName>
      <affiliation>KU Leuven</affiliation>
    </creator>
  </creators>
  <titles>
    <title>Higher-Order Threshold Implementation of the AES S-Box</title>
  </titles>
  <publisher>Zenodo</publisher>
  <publicationYear>2015</publicationYear>
  <subjects>
    <subject>Higher-order, Threshold implementations, AES, S-box, Masking</subject>
  </subjects>
  <dates>
    <date dateType="Issued">2015-11-04</date>
  </dates>
  <resourceType resourceTypeGeneral="Text">Conference paper</resourceType>
  <alternateIdentifiers>
    <alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/58086</alternateIdentifier>
  </alternateIdentifiers>
  <relatedIdentifiers>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsPartOf">10.1007/978-3-319-31271-2_16</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf">https://zenodo.org/communities/hector</relatedIdentifier>
  </relatedIdentifiers>
  <rightsList>
    <rights rightsURI="https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode">Creative Commons Attribution Non Commercial Share Alike 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
  </rightsList>
  <descriptions>
    <description descriptionType="Abstract">&lt;p&gt;In this paper we present a threshold implementation of the Advanced Encryption Standard’s S-box which is secure against first- and second-order power analysis attacks. This security guarantee holds even in the presence of glitches, and includes resistance against bivariate attacks. The design requires an area of 7849 Gate Equivalents and 126 bits of randomness per S-box execution. The implementation is tested on an FPGA platform and its security claim is supported by practical leakage detection tests.&lt;/p&gt;</description>
    <description descriptionType="Other">H2020 644052 / HECTOR</description>
  </descriptions>
</resource>
37
34
views
downloads
All versions This version
Views 3737
Downloads 3434
Data volume 18.1 MB18.1 MB
Unique views 3737
Unique downloads 3131

Share

Cite as