You are looking at a specific version 20090502:125837 of this paper. See the latest version.

Paper 2009/185

All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis

Robert P. McEvoy and Michael Tunstall and Claire Whelan and Colin C. Murphy and William P. Marnane

Abstract

All-or-Nothing Encryption was introduced by Rivest as a countermeasure to brute force key search attacks. This work identifies a new application for All-or-Nothing Transforms, as a protocol-level countermeasure to Differential Side-Channel Analysis (DSCA). We describe an extension to the All-or-Nothing protocol, that strengthens the DCSA resistance of the cryptosystem. The resultant scheme is a practical alternative to Boolean and arithmetic masking, used to protect implementations of encryption and decryption operations on electronic devices.

Note: Work in progress

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Published elsewhere. Unknown where it was published
Keywords
Side-Channel AnalysisDSCADPAMaskingAll-or-Nothing Transforms
Contact author(s)
robertmce @ eleceng ucc ie
History
2009-05-02: received
Short URL
https://ia.cr/2009/185
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.