A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Masking AES With d+1 Shares in Hardware
2016
Proceedings of the 2016 ACM Workshop on Theory of Implementation Security - TIS'16
Masking requires splitting sensitive variables into at least d + 1 shares to provide security against DPA attacks at order d. To this date, this minimal number has only been deployed in software implementations of cryptographic algorithms and in the linear parts of their hardware counterparts. So far there is no hardware construction that achieves this lower bound if the function is nonlinear and the underlying logic gates can glitch. In this paper, we give practical implementations of the AES
doi:10.1145/2996366.2996428
dblp:conf/ccs/CnuddeRBNNR16
fatcat:uj2d7vjp7jclnboe7ukmayqssm