Higher-order threshold implementations

B Bilgin, B Gierlichs, S Nikova, V Nikov… - Advances in Cryptology …, 2014 - Springer
… to protect the implementation with masking. The existing higher-order masking countermeasures
… The Threshold Implementation method is also based on multi-party computation but it is …

A note on the security of higher-order threshold implementations

O Reparaz - Cryptology ePrint Archive, 2015 - eprint.iacr.org
… resistance against higher-order differential power analysis attacks. In this note, we point out
that higher-order threshold implementations do not necessarily provide higher-order security…

Threshold implementations: as countermeasure against higher-order differential power analysis

B Bilgin - 2015 - research.utwente.nl
… We explain higher-order DPA using the probing model in Section 2.3.3. Additionally, we
provide a discussion on why standard Boolean masking described in Section 2.3.2 becomes …

Higher-order threshold implementation of the AES S-box

T De Cnudde, B Bilgin, O Reparaz, V Nikov… - Smart Card Research …, 2016 - Springer
… In this work, we presented the first higher-order threshold implementation of AES S-box with
second-order univariate and bivariate security in the presence of glitches. We directed our …

Uniform first-order threshold implementations

T Beyne, B Bilgin - Selected Areas in Cryptography–SAC 2016: 23rd …, 2017 - Springer
… is insufficient to provide theoretical security against higher-order attacks. We started by …
{in}\) is the number of input shares of the threshold implementation. We proved that if the shared …

Improving first-order threshold implementations of skinny

A Caforio, D Collins, O Glamočanin, S Banik - Progress in Cryptology …, 2021 - Springer
… We note that higher-order TI as defined below does not necessarily ensure d-th order security
without additional measures [22, 23]. Nonetheless, in the first-order setting, our setting of …

A more efficient AES threshold implementation

B Bilgin, B Gierlichs, S Nikova, V Nikov… - Progress in Cryptology …, 2014 - Springer
… Therefore, our second goal is to assess the level of security our implementation provides
against other, eg higher-order, power analysis attacks. Since there is no single, all-embracing …

Masking kyber: First-and higher-order implementations

JW Bos, MO Gourjon, J Renes, T Schneider… - IACR Transactions on …, 2021 - tore.tuhh.de
… extend the techniques to higher order but no further details are provided. To the best of
our knowledge, this paper presents the first higher-order masked implementation of any PQC …

Affine equivalence and its application to tightening threshold implementations

P Sasdrich, A Moradi, T Güneysu - … , Sackville, NB, Canada, August 12–14 …, 2016 - Springer
higher-order attacks on first-order secure TI designs from another perspective. Instead of
increasing the resistance against higher-order attacks by employing higher-orderhigher-order

Threshold implementations in the robust probing model

S Dhooghe, S Nikova, V Rijmen - … on Theory of Implementation Security …, 2019 - dl.acm.org
… In this section, we discuss the first-order and higher-order univariate probing security of
threshold circuits composed of correct, non-complete, and uniform layers. We end the section by …