Side Channel Resistance at a Cost: A Comparison of ARX-Based Authenticated Encryption
暂无分享,去创建一个
[1] Jason Smith,et al. The SIMON and SPECK Families of Lightweight Block Ciphers , 2013, IACR Cryptol. ePrint Arch..
[2] Sumesh Manjunath Ramesh,et al. Side Channel Analysis of SPARX-64/128: Cryptanalysis and Countermeasures , 2019, AFRICACRYPT.
[3] Vincent Rijmen,et al. Threshold Implementations Against Side-Channel Attacks and Glitches , 2006, ICICS.
[4] Kris Gaj,et al. Implementer’s Guide to Hardware Implementations Compliant with the Hardware API for Lightweight Cryptography , 2019 .
[5] Kris Gaj,et al. Hardware API for Lightweight Cryptography , 2019 .
[6] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[7] Minerva , 2004, BMJ : British Medical Journal.
[8] Phillip Rogaway,et al. Authenticated-encryption with associated-data , 2002, CCS '02.
[9] P. Rohatgi,et al. Test Vector Leakage Assessment ( TVLA ) methodology in practice , 2013 .
[10] Kan Yasuda,et al. Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers , 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[11] N. Datta,et al. LOTUS and LOCUS AEAD: Hardware Benchmarking and Security Analysis , 2019 .
[12] Kris Gaj,et al. CAESAR Hardware API , 2016, IACR Cryptol. ePrint Arch..
[13] Ashwin Jha,et al. COMET: COunter Mode Encryption with authentication Tag , 2019 .
[14] Changhoon Lee,et al. Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor , 2019, Int. J. Distributed Sens. Networks.
[15] Daesung Kwon,et al. CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices , 2017, ICISC.
[16] Jean-Sébastien Coron,et al. Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity , 2015, FSE.
[17] John Kelsey,et al. Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition , 2012 .
[18] Erich Wenger,et al. Ascon hardware implementations and side-channel evaluation , 2017, Microprocess. Microsystems.
[19] Louis Goubin,et al. A Sound Method for Switching between Boolean and Arithmetic Masking , 2001, CHES.
[20] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[21] Nicky Mouha,et al. Threshold schemes for cryptographic primitives: , 2019 .
[22] Jovan Dj. Golic. Techniques for Random Masking in Hardware , 2007, IEEE Transactions on Circuits and Systems I: Regular Papers.
[23] Stefan Mangard,et al. Successfully Attacking Masked AES Hardware Implementations , 2005, CHES.
[24] Mark D. Aagaard,et al. Hardware Design and Analysis of the ACE and WAGE Ciphers , 2019, ArXiv.
[25] Harold S. Stone,et al. A Parallel Algorithm for the Efficient Solution of a General Class of Recurrence Equations , 1973, IEEE Transactions on Computers.
[26] William Diehl,et al. Hardware Implementations of NIST Lightweight Cryptographic Candidates: A First Look , 2019, IACR Cryptol. ePrint Arch..
[27] Bart Preneel,et al. A Proof that the ARX Cipher Salsa20 is Secure against Differential Cryptanalysis , 2013, IACR Cryptol. ePrint Arch..
[28] Blandine Debraize. Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking , 2012, CHES.
[29] Kris Gaj,et al. Comparison of cost of protection against differential power analysis of selected authenticated ciphers , 2018, 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[30] Donghoon Chang,et al. Status report on the first round of the NIST lightweight cryptography standardization process , 2019 .