PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations

H Kim, Y Jeon, G Kim, J Kim, BY Sim, DG Han… - Information Security and …, 2021 - Springer
In this paper, we introduce a new lightweight 64-bit block cipher PIPO (PIPO stands for “Plug-
In” and “Plug-Out”, representing its use in side-channel protected and unprotected …

The speedy family of block ciphers-engineering an ultra low-latency cipher from gate level for secure processor architectures

G Leander, T Moos, A Moradi… - Cryptology ePrint …, 2021 - eprint.iacr.org
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering
expertise into each step of the cipher's design process in order to create a secure encryption …

Prime-field masking in hardware and its soundness against low-noise SCA attacks

G Cassiers, L Masure, C Momin, T Moos… - IACR Transactions on …, 2023 - tches.iacr.org
A recent study suggests that arithmetic masking in prime fields leads to stronger security
guarantees against passive physical adversaries than Boolean masking. Indeed, it is a …

A new method for designing lightweight S-boxes with high differential and linear branch numbers, and its application

H Kim, Y Jeon, G Kim, J Kim, BY Sim, DG Han… - IEEE …, 2021 - ieeexplore.ieee.org
Bit permutations are efficient linear functions often used for lightweight cipher designs.
However, they have low diffusion effects, compared to word-oriented binary and maximum …

Novel Optimized Implementations of Lightweight Cryptographic S-Boxes via SAT Solvers

J Feng, Y Wei, F Zhang, E Pasalic… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
An optimized implementation of S-boxes has a significant impact on the performance of
cryptographic primitives. SAT-based methods can find optimal implementations for …

Circuit masking: from theory to standardization, a comprehensive survey for hardware security researchers and practitioners

A Covic, F Ganji, D Forte - arXiv preprint arXiv:2106.12714, 2021 - arxiv.org
Side-channel attacks extracting sensitive data from implementations have been considered
a major threat to the security of cryptographic schemes. This has elevated the need for …

Fully-digital randomization based side-channel security—toward ultra-low cost-per-security

R Breuer, FX Standaert, I Levi - IEEE Access, 2022 - ieeexplore.ieee.org
In this paper we formulate and re-evaluate a recently proposed randomization-based side-
channel protection mechanism. The strength of the construction lies with its ability to comply …

Low-Latency Masked Gadgets Robust against Physical Defaults with Application to Ascon

G Cassiers, FX Standaert, C Verhamme - IACR Transactions on …, 2024 - tches.iacr.org
Low-latency masked hardware implementations are known to be a difficult challenge. On the
one hand, the propagation of glitches can falsify their independence assumption (that is …

An STP-based model toward designing S-boxes with good cryptographic properties

Z Lu, S Mesnager, T Cui, Y Fan, M Wang - Designs, Codes and …, 2022 - Springer
The substitution box (S-box) is an important nonlinear component in most symmetric
cryptosystems and thus should have good properties. Its difference distribution table (DDT) …

LLTI: low-latency threshold implementations

V Arribas, Z Zhang, S Nikova - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the enormous increase in portable cryptographic devices, physical attacks are
becoming similarly popular. One of the most common physical attacks is Side-Channel …