A review of lightweight block ciphers

G Hatzivasilis, K Fysarakis, I Papaefstathiou… - Journal of cryptographic …, 2018 - Springer
Embedded systems are deployed in various domains, including industrial installations,
critical and nomadic environments, private spaces and public infrastructures. Their operation …

Ascon v1.2: Lightweight Authenticated Encryption and Hashing

C Dobraunig, M Eichlseder, F Mendel, M Schläffer - Journal of Cryptology, 2021 - Springer
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our
information infrastructure. In this paper, we provide the specification of Ascon-128 and …

The side-channel metrics cheat sheet

K Papagiannopoulos, O Glamočanin… - ACM Computing …, 2023 - dl.acm.org
Side-channel attacks exploit a physical observable originating from a cryptographic device
in order to extract its secrets. Many practically relevant advances in the field of side-channel …

[PDF][PDF] Composable masking schemes in the presence of physical defaults & the robust probing model

S Faust, V Grosso, SMD Pozo, C Paglialonga… - 2018 - repository.ubn.ru.nl
Composability and robustness against physical defaults (eg, glitches) are two highly
desirable properties for secure implementations of masking schemes. While tools exist to …

Hardware private circuits: From trivial composition to full verification

G Cassiers, B Grégoire, I Levi… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The design of glitch-resistant higher-order masking schemes is an important challenge in
cryptographic engineering. A recent work by Moos et al.(CHES 2019) showed that most …

How (not) to use welch's t-test in side-channel security evaluations

FX Standaert - Smart Card Research and Advanced Applications: 17th …, 2019 - Springer
Abstract The Test Vector Leakage Assessment (TVLA) methodology is a qualitative tool
relying on Welch's T-test to assess the security of cryptographic implementations against …

Parallel implementations of masking schemes and the bounded moment leakage model

G Barthe, F Dupressoir, S Faust, B Grégoire… - Advances in Cryptology …, 2017 - Springer
In this paper, we provide a necessary clarification of the good security properties that can be
obtained from parallel implementations of masking schemes. For this purpose, we first argue …

An efficient side-channel protected AES implementation with arbitrary protection order

H Groß, S Mangard, T Korak - Cryptographers' Track at the RSA …, 2017 - Springer
Passive physical attacks, like power analysis, pose a serious threat to the security of digital
circuits. In this work, we introduce an efficient side-channel protected Advanced Encryption …

SILVER–statistical independence and leakage verification

D Knichel, P Sasdrich, A Moradi - … on the Theory and Application of …, 2020 - Springer
Implementing cryptographic functions securely in the presence of physical adversaries is still
a challenge although a lion's share of research in the physical security domain has been put …

Breaking masked implementations with many shares on 32-bit software platforms: or when the security order does not matter

O Bronchain, FX Standaert - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
We explore the concrete side-channel security provided by state-of-theart higher-order
masked software implementations of the AES and the (candidate to the NIST Lightweight …