Paper 2018/922
Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications
Dušan Božilov, Miroslav Knežević, and Ventzislav Nikov
Abstract
Threshold implementations have emerged as one of the most popular masking countermeasures for hardware implementations of cryptographic primitives. In the original version of TI, the number of input shares was dependent on both security order
Metadata
- Available format(s)
-
PDF
- Publication info
- Preprint. MINOR revision.
- Keywords
- Threshold ImplementationsPRINCESCAMasking
- Contact author(s)
- dusan bozilov @ esat kuleuven be
- History
- 2018-10-02: received
- Short URL
- https://ia.cr/2018/922
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2018/922, author = {Dušan Božilov and Miroslav Knežević and Ventzislav Nikov}, title = {Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications}, howpublished = {Cryptology {ePrint} Archive, Paper 2018/922}, year = {2018}, url = {https://eprint.iacr.org/2018/922} }