• Publications
  • Influence
Triathlon of lightweight block ciphers for the Internet of things
TLDR
In this paper, we introduce a framework for the benchmarking of lightweight block ciphers on a multitude of embedded platforms. Expand
  • 112
  • 16
  • PDF
Design Strategies for ARX with Provable Bounds: Sparx and LAX
TLDR
We present, for the first time, a general strategy for designing ARX symmetric-key primitives with provable resistance against single-trail differential and linear cryptanalysis. Expand
  • 72
  • 11
  • PDF
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
TLDR
In this paper we propose a fresh re-keying scheme that is especially suited for challenge-response protocols such as used to authenticate tags. Expand
  • 124
  • 10
  • PDF
Secure Conversion between Boolean and Arithmetic Masking of Any Order
TLDR
An effective countermeasure against side-channel attacks is to mask all sensitive variables with one or more random values. Expand
  • 43
  • 8
  • PDF
Efficient Ring-LWE Encryption on 8-Bit AVR Processors
TLDR
In this paper, we introduce a carefully-optimized implementation of a ring-LWE encryption scheme for 8-bit AVR processors like the ATxmega128. Expand
  • 73
  • 6
  • PDF
The energy cost of cryptographic key establishment in wireless sensor networks
TLDR
We analyze and compare the energy cost of two different protocols for authenticated key establishment on a Rockwell WINS node equipped with a 133 MHz Strong ARM processor and a 100 kbit/s radio module. Expand
  • 78
  • 5
  • PDF
A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m)
TLDR
The performance of elliptic curve cryptosystems is primarily determined by an efficient implementation of the arithmetic operations in the underlying finite field. Expand
  • 69
  • 5
Instruction Set Extensions for Fast Arithmetic in Finite Fields GF( p) and GF(2m)
TLDR
Instruction set extensions are a small number of custom instructions specifically designed to accelerate the processing of a given kind of workload such as multimedia or cryptography. Expand
  • 75
  • 5
  • PDF
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity
TLDR
A general technique to protect a cryptographic algorithm against side-channel attacks consists in masking all intermediate variables with a random value. Expand
  • 38
  • 5
  • PDF
Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors
TLDR
In this paper we present an approach to increase the efficiency of 32-bit processors for handling symmetric cryptographic algorithms with the help of instruction set extensions. Expand
  • 94
  • 4
  • PDF
...
1
2
3
4
5
...