Threshold Implementations of $\mathtt{GIFT}$ : A Trade-Off Analysis
Citations
166 citations
38 citations
26 citations
15 citations
13 citations
References
6,757 citations
3,989 citations
"Threshold Implementations of $\math..." refers background in this paper
...[1], [2] in the late 90’s showed that unprotected cryptographic algorithms are vulnerable against side-channel attacks....
[...]
3,526 citations
2,346 citations
"Threshold Implementations of $\math..." refers methods in this paper
...First, we present a Correlation Power Analysis (CPA) [13] attack for an unprotected FPGA implementation of the GIFT cipher in § IV-A....
[...]
...Considering CPA for a successful attack, the correct key has the highest correlation value across the trace points....
[...]
...Index Terms— Side-channel attack, threshold implementation, DPA, CPA, GIFT, TI, lightweight cryptography, TVLA....
[...]
...Our Contributions: First, we present a Correlation Power Analysis (CPA) [13] attack for an unprotected FPGA implementation of the GIFT cipher in § IV-A....
[...]
...This leads to only two key bits being used per S-box leading to reduced effectiveness of the CPA attack....
[...]
2,202 citations
"Threshold Implementations of $\math..." refers background in this paper
...Unlike PRESENT, GIFT uses only 64 bits of the round key every round....
[...]
...For example, in [8], the authors showed how to apply TI on the PRESENT cipher....
[...]
...Its design is strongly influenced by the cipher PRESENT [19]....
[...]