Efficient and Composable Masked AES S-Box Designs Using Optimized Inverters

Hardware implementations of cryptographic algorithms are susceptible to power analysis attacks, allowing attackers to break the otherwise strong security guarantees. A theoretically sound countermeasure against such attacks is masking, where all key- and data-dependent intermediate values in the co...

Full description

Saved in:
Bibliographic Details
Main Authors: Vedad Hadžic, Roderick Bloem
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2024-12-01
Series:Transactions on Cryptographic Hardware and Embedded Systems
Subjects:
Online Access:https://tosc.iacr.org/index.php/TCHES/article/view/11942
Tags: Add Tag
No Tags, Be the first to tag this record!