logo

SCIENCE CHINA Information Sciences, Volume 64 , Issue 8 : 189402(2021) https://doi.org/10.1007/s11432-020-3089-9

Fast substitution-box evaluation algorithm and its efficient masking scheme for block ciphers

More info
  • ReceivedApr 23, 2020
  • AcceptedOct 10, 2020
  • PublishedMay 21, 2021

Abstract

There is no abstract available for this article.


Acknowledgment

This work was supported by Optoelectronics and Microelectronic Devices and Integration of National Key RD Program of China (Grant No. 2018YFB2202100) and Heilongjiang Provincial Natural Science Foundation of China (Grant No. YQ2019F010).


Supplement

Appendixes A–E.


References

[1] Kocher P, Jaffe J, Jun B. Differential power analysis. In: Proceedings of Annual International Cryptology Conference, 1999. 388--397. Google Scholar

[2] Carlet C, Prouff E. Polynomial evaluation and side channel analysis. In: The New Codebreakers. Berlin: Springer 2016. 315--341. Google Scholar

[3] Childs L N. Part II congruence classes and rings. In: A Concrete Introduction to Higher Algebra. 3rd ed. Belrin: Springer, 2009. 93--123. Google Scholar

[4] Ishai Y, Sahai A, Wagner D. Private circuits, securing hardware against probing attacks. In: Proceedings of the 23th Annual International Cryptology Conference, 2003. 463--481. Google Scholar

[5] Huang H, Liu L, Huang Q. Low Area-Overhead Low-Entropy Masking Scheme (LEMS) Against Correlation Power Analysis Attack. IEEE Trans Comput-Aided Des Integr Circuits Syst, 2019, 38: 208-219 CrossRef Google Scholar

[6] Grosso V, Prouff E, Standaert F-X. Efficient masked s-boxes processing a step forward. In: Proceedings of the 7th International Conference on Cryptology in Africa, 2014. 251--266. Google Scholar

[7] Rivain M, Prouff E. Provably secure higher-order masking of AES. In: Proceedings of Workshop Cryptographic Hardware and Embedded Systems (CHES'10), 2010. 413--427. Google Scholar

[8] Carlet C, Goubin L, Prouff E, et al. Higher-order masking schemes for S-Boxes. In: Proceedings of Workshop Fast Software Encryption (FSE'12), 2012. 366--384. Google Scholar

[9] Coron J-S, Kizhvatov I, Roy A, et al. Analysis and improvement of the generic higher-order masking scheme of FSE 2012. In: Proceedings of Workshop Cryptographic Hardware and Embedded Systems (CHES'13), 2013. 417--434. Google Scholar

qqqq

Contact and support