Curse of re-encryption: a generic power/EM analysis on post-quantum KEMs

R Ueno, K Xagawa, Y Tanaka, A Ito… - IACR Transactions on …, 2022 - tches.iacr.org
This paper presents a side-channel analysis (SCA) on key encapsulation mechanism (KEM)
based on the Fujisaki–Okamoto (FO) transformation and its variants. The FO transformation …

Re-consolidating first-order masking schemes: Nullifying fresh randomness

AR Shahmirzadi, A Moradi - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
Application of masking, known as the most robust and reliable countermeasure to side-
channel analysis attacks, on various cryptographic algorithms has dedicated a lion's share …

Automated generation of masked hardware

D Knichel, A Moradi, N Müller, P Sasdrich - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Masking has been recognized as a sound and secure countermeasure for cryptographic
implementations, protecting against physical side-channel attacks. Even though many …

3-share threshold implementation of AES s-box without fresh randomness

T Sugawara - IACR Transactions on Cryptographic Hardware and …, 2019 - tches.iacr.org
Threshold implementation is studied as a countermeasure against sidechannel attack.
There had been no threshold implementation for the AES and Keccak S-boxes that satisfies …

Perceived information revisited: New metrics to evaluate success rate of side-channel attacks

A Ito, R Ueno, N Homma - IACR Transactions on Cryptographic …, 2022 - tches.iacr.org
In this study, we present new analytical metrics for evaluating the performance of side-
channel attacks (SCAs) by revisiting the perceived information (PI), which is defined using …

Lightweight authenticated encryption mode suitable for threshold implementation

Y Naito, Y Sasaki, T Sugawara - … on the Theory and Applications of …, 2020 - Springer
This paper proposes tweakable block cipher (TBC) based modes PFB\_Plus PFB _ Plus and
PFB ω PFB ω that are efficient in threshold implementations (TI). Let t be an algebraic …

A first-order SCA resistant AES without fresh randomness

F Wegener, A Moradi - Constructive Side-Channel Analysis and Secure …, 2018 - Springer
Since the advent of Differential Power Analysis (DPA) in the late 1990s protecting
embedded devices against Side-Channel Analysis (SCA) attacks has been a major …

New first-order secure AES performance records

AR Shahmirzadi, D Božilov, A Moradi - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Being based on a sound theoretical basis, masking schemes are commonly applied to
protect cryptographic implementations against Side-Channel Analysis (SCA) attacks …

[HTML][HTML] Spin me right round rotational symmetry for FPGA-specific AES: Extended version

F Wegener, L De Meyer, A Moradi - Journal of Cryptology, 2020 - Springer
The effort in reducing the area of AES implementations has largely been focused on
application-specific integrated circuits (ASICs) in which a tower field construction leads to a …

Lightweight authenticated encryption mode of operation for tweakable block ciphers

Y Naito, T Sugawara - IACR Transactions on Cryptographic …, 2020 - tches.iacr.org
The use of a small block length is a common strategy when designing lightweight
(tweakable) block ciphers (TBCs), and several 64-bit primitives have been proposed …