Vis enkel innførsel

dc.contributor.authorPiccione, Enrico
dc.contributor.authorAndreoli, Samuele
dc.contributor.authorBudaghyan, Lilya
dc.contributor.authorCarlet, Claude Michael
dc.contributor.authorDhooghe, Siemen
dc.contributor.authorNikova, Svetla
dc.contributor.authorPetrides, George
dc.contributor.authorRijmen, Vincent Stefaan
dc.date.accessioned2024-08-14T08:49:47Z
dc.date.available2024-08-14T08:49:47Z
dc.date.created2023-10-11T13:54:08Z
dc.date.issued2023
dc.identifier.issn0018-9448
dc.identifier.urihttps://hdl.handle.net/11250/3146223
dc.description.abstractThreshold implementation is a method based on secret sharing to secure cryptographic ciphers (and in particular S-boxes) against differential power analysis side-channel attacks which was proposed by Nikova, Rechberger, and Rijmen in 2006. Until now, threshold implementations were only constructed for specific types of functions and some small S-boxes, but no generic construction was ever presented. In this paper, we present the first universal threshold implementation with t+2 shares that is applicable to any bijective S-box, where t is its algebraic degree (or is larger than the algebraic degree). While being universal, our construction is also optimal with respect to the number of shares, since the theoretically smallest possible number, t+1 , is not attainable for some bijective S-boxes. Our results enable low latency secure hardware implementations without the need for additional randomness. In particular, we apply this result to find two uniform sharings of the AES S-box. The first sharing is obtained by using the threshold implementation of the inversion in F28 and the second by using two threshold implementations of two cubic power permutations that decompose the inversion. Area and performance figures for hardware implementations are provided.en_US
dc.language.isoengen_US
dc.publisherIEEEen_US
dc.titleAn Optimal Universal Construction for the Threshold Implementation of Bijective S-Boxesen_US
dc.typeJournal articleen_US
dc.typePeer revieweden_US
dc.description.versionacceptedVersionen_US
dc.rights.holderCopyright 2023 IEEEen_US
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode2
dc.identifier.doi10.1109/TIT.2023.3287534
dc.identifier.cristin2183773
dc.source.journalIEEE Transactions on Information Theoryen_US
dc.source.pagenumber6700-6710en_US
dc.identifier.citationIEEE Transactions on Information Theory. 2023, 69 (10), 6700-6710.en_US
dc.source.volume69en_US
dc.source.issue10en_US


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel