{ "access": { "embargo": { "active": false, "reason": null }, "files": "public", "record": "public", "status": "open" }, "created": "2016-08-29T08:18:49+00:00", "custom_fields": { "imprint:imprint": { "isbn": "978-3-319-31271-2", "pages": "pp 259-272", "title": "Smart Card Research and Advanced Applications" }, "meeting:meeting": { "acronym": "CARDIS 2015", "dates": "4-6 November 2015", "place": "Bochum, Germany", "title": "14th Smart Card Research and Advanced Application Conference", "url": "https://wiki.crypto.rub.de/cardis15/index.html" } }, "deletion_status": { "is_deleted": false, "status": "P" }, "files": { "count": 1, "enabled": true, "entries": { "HECTOR-Higher-order-threshold-2015.pdf": { "checksum": "md5:b0adb5eb3429f3ea0d035ab0ad29f2f4", "ext": "pdf", "id": "a3154d7c-4a9f-4a00-924c-53a6e17b511f", "key": "HECTOR-Higher-order-threshold-2015.pdf", "metadata": null, "mimetype": "application/pdf", "size": 533364 } }, "order": [], "total_bytes": 533364 }, "id": "58086", "is_draft": false, "is_published": true, "links": { "access": "https://zenodo.org/api/records/58086/access", "access_links": "https://zenodo.org/api/records/58086/access/links", "access_request": "https://zenodo.org/api/records/58086/access/request", "access_users": "https://zenodo.org/api/records/58086/access/users", "archive": "https://zenodo.org/api/records/58086/files-archive", "archive_media": "https://zenodo.org/api/records/58086/media-files-archive", "communities": "https://zenodo.org/api/records/58086/communities", "communities-suggestions": "https://zenodo.org/api/records/58086/communities-suggestions", "doi": "https://doi.org/10.5281/zenodo.58086", "draft": "https://zenodo.org/api/records/58086/draft", "files": "https://zenodo.org/api/records/58086/files", "latest": "https://zenodo.org/api/records/58086/versions/latest", "latest_html": "https://zenodo.org/records/58086/latest", "media_files": "https://zenodo.org/api/records/58086/media-files", "parent": "https://zenodo.org/api/records/638580", "parent_doi": "https://zenodo.org/doi/", "parent_html": "https://zenodo.org/records/638580", "requests": "https://zenodo.org/api/records/58086/requests", "reserve_doi": "https://zenodo.org/api/records/58086/draft/pids/doi", "self": "https://zenodo.org/api/records/58086", "self_doi": "https://zenodo.org/doi/10.5281/zenodo.58086", "self_html": "https://zenodo.org/records/58086", "self_iiif_manifest": "https://zenodo.org/api/iiif/record:58086/manifest", "self_iiif_sequence": "https://zenodo.org/api/iiif/record:58086/sequence/default", "versions": "https://zenodo.org/api/records/58086/versions" }, "media_files": { "count": 0, "enabled": false, "entries": {}, "order": [], "total_bytes": 0 }, "metadata": { "additional_descriptions": [ { "description": "H2020 644052 / HECTOR", "type": { "id": "notes", "title": { "de": "Anmerkungen", "en": "Notes" } } } ], "creators": [ { "affiliations": [ { "name": "KU Leuven" } ], "person_or_org": { "family_name": "De Cnudde", "given_name": "Thomas", "name": "De Cnudde, Thomas", "type": "personal" } }, { "affiliations": [ { "name": "KU Leuven" } ], "person_or_org": { "family_name": "Bilgin", "given_name": "Beg\u00fcl", "name": "Bilgin, Beg\u00fcl", "type": "personal" } }, { "affiliations": [ { "name": "KU Leuven" } ], "person_or_org": { "family_name": "Reparaz", "given_name": "Oscar", "name": "Reparaz, Oscar", "type": "personal" } }, { "affiliations": [ { "name": "NXP Semiconductors, Leuven" } ], "person_or_org": { "family_name": "Nikov", "given_name": "Ventzislav", "name": "Nikov, Ventzislav", "type": "personal" } }, { "affiliations": [ { "name": "KU Leuven" } ], "person_or_org": { "family_name": "Nikova", "given_name": "Svetla", "name": "Nikova, Svetla", "type": "personal" } } ], "description": "
In this paper we present a threshold implementation of the Advanced Encryption Standard\u2019s S-box which is secure against first- and second-order power analysis attacks. This security guarantee holds even in the presence of glitches, and includes resistance against bivariate attacks. The design requires an area of 7849 Gate Equivalents and 126 bits of randomness per S-box execution. The implementation is tested on an FPGA platform and its security claim is supported by practical leakage detection tests.
", "publication_date": "2015-11-04", "publisher": "Springer International Publishing", "related_identifiers": [ { "identifier": "10.1007/978-3-319-31271-2_16", "relation_type": { "id": "ispartof", "title": { "de": "Ist Teil von", "en": "Is part of" } }, "scheme": "doi" } ], "resource_type": { "id": "publication-conferencepaper", "title": { "de": "Konferenzbeitrag", "en": "Conference paper" } }, "rights": [ { "description": { "en": "" }, "icon": "cc-by-nc-sa-icon", "id": "cc-by-nc-sa-4.0", "props": { "scheme": "spdx", "url": "https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode" }, "title": { "en": "Creative Commons Attribution Non Commercial Share Alike 4.0 International" } } ], "subjects": [ { "subject": "Higher-order, Threshold implementations, AES, S-box, Masking" } ], "title": "Higher-Order Threshold Implementation of the AES S-Box" }, "parent": { "access": { "owned_by": { "user": 22112 } }, "communities": { "default": "3a947cf4-beed-4f58-8bd5-0ec58dfd9a82", "entries": [ { "access": { "member_policy": "open", "members_visibility": "public", "record_policy": "open", "review_policy": "open", "visibility": "public" }, "children": { "allow": false }, "created": "2016-07-19T15:36:43+00:00", "custom_fields": {}, "deletion_status": { "is_deleted": false, "status": "P" }, "id": "3a947cf4-beed-4f58-8bd5-0ec58dfd9a82", "links": {}, "metadata": { "curation_policy": "", "page": "The mission of the HECTOR project is to close the gap between the mathematical heaven of cryptographic algorithms and their efficient, secure and robust hardware implementations. The consortium aims for a stronger European knowledge integration through collaboration among key complementary European security technology and value chain actors, in order to fully unleash and leverage Europe’s security innovation, competitiveness, and leadership potential. This community collects all relevant documents to reach the set goals.
", "title": "HECTOR" }, "revision_id": 0, "slug": "hector", "updated": "2016-09-01T10:12:45+00:00" } ], "ids": [ "3a947cf4-beed-4f58-8bd5-0ec58dfd9a82" ] }, "id": "638580", "pids": { "doi": { "identifier": "", "provider": "legacy" } } }, "pids": { "doi": { "client": "datacite", "identifier": "10.5281/zenodo.58086", "provider": "datacite" }, "oai": { "identifier": "oai:zenodo.org:58086", "provider": "oai" } }, "revision_id": 15, "stats": { "all_versions": { "data_volume": 57603312.0, "downloads": 108, "unique_downloads": 103, "unique_views": 137, "views": 142 }, "this_version": { "data_volume": 57603312.0, "downloads": 108, "unique_downloads": 103, "unique_views": 136, "views": 141 } }, "status": "published", "updated": "2020-01-20T17:15:51.496350+00:00", "versions": { "index": 1, "is_latest": true } }