A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Trade-Offs for Threshold Implementations Illustrated on AES
2015
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Embedded cryptographic devices are vulnerable to power analysis attacks. Threshold Implementations provide provable security against first-order power analysis attacks for hardware and software implementations. Like masking, the approach relies on secret sharing but it differs in the implementation of logic functions. While masking can fail to provide protection due to glitches in the circuit, Threshold Implementations rely on few assumptions about the hardware and are fully compatible with
doi:10.1109/tcad.2015.2419623
fatcat:jephg2gasncq7e4dnk6hdfq6ue