SCIENCE CHINA Information Sciences, Volume 64 , Issue 5 : 159102(2021) https://doi.org/10.1007/s11432-018-9794-6

Unbalanced sharing: a threshold implementation of SM4

Man WEI 1,2,3, Siwei SUN 1,2,3,*, Zihao WEI 1,2,3, Lei HU 1,2,3
More info
  • ReceivedNov 3, 2018
  • AcceptedFeb 20, 2019
  • PublishedMar 19, 2021


There is no abstract available for this article.


The work was supported by National Key RD Program of China (Grant No. 2018YFB- 0804402), Chinese Major Program of National Cryptography Development Foundation (Grant No. MMJJ20180102), National Natural Science Foundation of China (Grant Nos. 61732021, 61802400, 61772519, 61802399), and Youth Innovation Promotion Association of Chinese Academy of Sciences.


Appendixes A–C.


[1] Kocher P, Jaffe J, Jun B. Differential power analysis. In: Proceedings of Annual International Cryptology Conference, Santa Barbara, 1999. 388--397. Google Scholar

[2] Nikova S, Rechberger C, Rijmen V. Threshold implementations against side-channel attacks and glitches. In: Proceedings of International Conference on Information and Communications Security, Raleigh, 2006. 529--545. Google Scholar

[3] Liu F, Ji W, Hu L, et al. Analysis of the SMS4 block cipher. In: Proceedings of Australasian Conference on Information Security and Privacy, Townsville, 2007. 158--170. Google Scholar

[4] Canright D. A very compact S-box for AES. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems, Edinburgh, 2005. 441--455. Google Scholar

[5] Bilgin B, Gierlichs B, Nikova S. Trade-Offs for Threshold Implementations Illustrated on AES. IEEE Trans Comput-Aided Des Integr Circuits Syst, 2015, 34: 1188-1200 CrossRef Google Scholar

[6] Shang M, Zhang Q, Liu Z, et al. An ultra-compact hardware implementation of SMS4. In: Proceedings of International Congress on Advanced Applied Informatics, Kokura Kita-ku, 2014. 86--90. Google Scholar

[7] Goodwill G, Jun B, Jaffe J, et al. A testing methodology for side-channel resistance validation. In: Proceedings of NIST Non-Invasive Attack Testing Workshop, Nara, 2011. 115--136. Google Scholar


Contact and support