PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations
In this paper, we introduce a new lightweight 64-bit block cipher PIPO (PIPO stands for “Plug-
In” and “Plug-Out”, representing its use in side-channel protected and unprotected …
In” and “Plug-Out”, representing its use in side-channel protected and unprotected …
The speedy family of block ciphers-engineering an ultra low-latency cipher from gate level for secure processor architectures
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering
expertise into each step of the cipher's design process in order to create a secure encryption …
expertise into each step of the cipher's design process in order to create a secure encryption …
Prime-field masking in hardware and its soundness against low-noise SCA attacks
A recent study suggests that arithmetic masking in prime fields leads to stronger security
guarantees against passive physical adversaries than Boolean masking. Indeed, it is a …
guarantees against passive physical adversaries than Boolean masking. Indeed, it is a …
A new method for designing lightweight S-boxes with high differential and linear branch numbers, and its application
Bit permutations are efficient linear functions often used for lightweight cipher designs.
However, they have low diffusion effects, compared to word-oriented binary and maximum …
However, they have low diffusion effects, compared to word-oriented binary and maximum …
Novel Optimized Implementations of Lightweight Cryptographic S-Boxes via SAT Solvers
J Feng, Y Wei, F Zhang, E Pasalic… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
An optimized implementation of S-boxes has a significant impact on the performance of
cryptographic primitives. SAT-based methods can find optimal implementations for …
cryptographic primitives. SAT-based methods can find optimal implementations for …
Circuit masking: from theory to standardization, a comprehensive survey for hardware security researchers and practitioners
Side-channel attacks extracting sensitive data from implementations have been considered
a major threat to the security of cryptographic schemes. This has elevated the need for …
a major threat to the security of cryptographic schemes. This has elevated the need for …
Fully-digital randomization based side-channel security—toward ultra-low cost-per-security
R Breuer, FX Standaert, I Levi - IEEE Access, 2022 - ieeexplore.ieee.org
In this paper we formulate and re-evaluate a recently proposed randomization-based side-
channel protection mechanism. The strength of the construction lies with its ability to comply …
channel protection mechanism. The strength of the construction lies with its ability to comply …
Low-Latency Masked Gadgets Robust against Physical Defaults with Application to Ascon
G Cassiers, FX Standaert, C Verhamme - IACR Transactions on …, 2024 - tches.iacr.org
Low-latency masked hardware implementations are known to be a difficult challenge. On the
one hand, the propagation of glitches can falsify their independence assumption (that is …
one hand, the propagation of glitches can falsify their independence assumption (that is …
An STP-based model toward designing S-boxes with good cryptographic properties
Z Lu, S Mesnager, T Cui, Y Fan, M Wang - Designs, Codes and …, 2022 - Springer
The substitution box (S-box) is an important nonlinear component in most symmetric
cryptosystems and thus should have good properties. Its difference distribution table (DDT) …
cryptosystems and thus should have good properties. Its difference distribution table (DDT) …
LLTI: low-latency threshold implementations
With the enormous increase in portable cryptographic devices, physical attacks are
becoming similarly popular. One of the most common physical attacks is Side-Channel …
becoming similarly popular. One of the most common physical attacks is Side-Channel …