Citation: | LIU Bozhong, GONG Zheng, QIU Weidong, “Automatic Search of Threshold Implementations of 4-Bit S-Boxes Resisting DPA,” Chinese Journal of Electronics, vol. 26, no. 1, pp. 93-100, 2017, doi: 10.1049/cje.2016.10.012 |
C.D. Cannière, O. Dunkelman and M. Knezevic, "KATAN and KTANTAN-A family of small and efficient hardware-oriented block ciphers", Proc. of International Workshop on Cryptographic Hardware and Embedded Systems, Lausanne, Switzerland, pp.272-288, 2009.
|
H. Cheng, H.M. Heys and C. Wang, "Puffin:A novel compact block cipher targeted to embedded digital systems", Proc. of IEEE Symposium on Digital System Design, Parma, Italy, pp.383-390, 2008.
|
D. Hong, J. Sung, S. Hong, et al., "HIGHT:A new block cipher suitable for low-resource device", Proc. of International Workshop on Cryptographic Hardware and Embedded Systems, Yokohama, Japan, pp.46-59, 2006.
|
K. Shibutani, T. Isobe, H. Hiwatari, et al., "Piccolo:An ultralightweight blockcipher", Proc. of International Workshop on Cryptographic Hardware and Embedded Systems, Nara, Japan, pp.342-357, 2011.
|
W.Wu and L.Zhang, "Lblock:A lightweight block cipher", Proc. of International Conference on Applied Cryptography and Network Security, Nerja, Spain, pp.327-344, 2011.
|
P.C. Kocher, J. Jaffe and B. Jun, "Differential power analysis", Proc. of CRYPTO, Santa Barbara, California, USA, pp.388-397, 1999.
|
J. Blömer, J. Guajardo and V. Krummel, "Provably secure masking of AES", Proc. of Selected Areas in Cryptography, Santa Barbara, CA, USA, pp.69-83, 2004.
|
Y. Ishai, A. Sahai and D. Wagner, "Private circuits:Securing hardware against probing attacks", Proc. of International Cryptology Conference on CRYPTO, Santa Barbara, California, USA, pp.463-481, 2003.
|
T. Popp and S. Mangard, "Masked dual-rail pre-charge logic:DPAresistance without routing constraints", Proc. of International Workshop on Cryptographic Hardware and Embedded Systems, Edinburgh, UK, pp.172-186, 2005.
|
K. Tiri and I. Verbauwhede, "A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation", Proc. of IEEE Conference on Design, Automation and Test in Europe Conference and Exposition, Paris, France, pp.246-251, 2004.
|
J.M. Rabaey, "Digital integrated circuits:A design perspective", Prentice-Hall, Inc., Upper Saddle River, 1996.
|
W. LI, S. TANG and Z. GONG, "Power analysis attacks against hardware implementation of KLEIN", Journal of Computational Information Systems, Vol.10, No.8, pp.3171-3179, 2014.
|
S. Nikova, V. Rijmen and M. Schläffer, "Secure hardware implementation of nonlinear functions in the presence of glitches", Journal of Cryptology, Vol.24, No.2, pp.292-321, 2011.
|
B. Bilgin, S. Nikova, V. Nikov, et al., "Threshold implementations of all 3×3 and 4×4 s-boxes", Proc. of International Workshop on Cryptographic Hardware and Embedded Systems, Leuven, Belgium, pp.76-91, 2014.
|
A. Moradi, A. Poschmann, S. Ling, et al., "Pushing the limits:A very compact and a threshold implementation of AES", Proc. of International Cryptology Conference on EUROCRYPT, Tallinn, Estonia, pp.69-88, 2011.
|
A. Bogdanov, L.R. Knudsen, G. Leander, et al., "Present:An ultra-lightweight block cipher", Proc. of International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, Austria, pp.450-466, 2007.
|
A. Poschmann, A. Moradi, K. Khoo, et al., "Side-channel resistant crypto for less than 2,300 GE", Journal of Cryptology, Vol.24, No.2, pp.322-345, 2011.
|
Z. Gong, S.I. Nikova and Y.-W. Law, "KLEIN:A new family of lightweight block ciphers", Proc. of ACM Conference on RFID. Security and Privacy, Amherst, MA, USA, pp.1-18, 2011.
|
C.D. Cannière, V. Nikov, S. Nikova, et al., "S-box decompositions for SCA-resisting implementations", Poster session in Proc. of International Workshop on Cryptographic Hardware and Embedded Systems, 2010.
|
C. Carlet, "Vectorial boolean functions for cryptography", Boolean Models and Methods in Mathematics, Computer Science, and Engineering, Cambridge University Press., pp.398-469, 2010.
|
E. Alemneh, "Sharing nonlinear gates in the presence of glitches", Master thesis, the University of Twente, 2010.
|
B. Liu, Z. Gong, W. Qiu, et al., "On the security of 4-bit involutive s-boxes for lightweight designs", Proc. of International Conference on Information Security Practice and Experience, Guangzhou, China, pp.247-256, 2011.
|