Title
Guards in Action: First-Order SCA Secure Implementations of Ketje Without Additional Randomness.
Abstract
Recently the CAESAR competition has announced several finalists among the submitted authenticated encryption algorithms, after an open selection process during the last five years. Applications using these algorithms are rapidly increasing today. Devices implementing these applications are enormously susceptible to physical attacks, which are able to retrieve secret data through side-channel information such as power consumption or the electromagnetic radiations. In this work, we present a Side-Channel Analysis resistant hardware implementation of the whole family of authenticated encryption schemes Ketje. By changing just one parameter, any of the Ketje designs can be obtained, and tailored for different applications, either lightweight or high throughput.
Year
DOI
Venue
2018
10.1016/j.micpro.2019.102859
Microprocessors and Microsystems
Keywords
DocType
Volume
Authenticated encryption,KETJE,SHA-3,Side-Channel analysis,Threshold implementations,Changing of the guards
Journal
71
ISSN
Citations 
PageRank 
0141-9331
0
0.34
References 
Authors
0
3
Name
Order
Citations
PageRank
Victor Arribas111.38
Svetla Nikova262445.46
Lars R. Knudsen3908.42