Unbalanced sharing:a threshold implementation of SM4

来源 :中国科学:信息科学(英文版) | 被引量 : 0次 | 上传用户:ouyang0502
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Dear editor,rnIn recent years,we have witnessed a rapid development of the side-channel attacks,which deviate from the tradi-tional block-box model and exploit the leakages of crypto-graphic devices.Among those attacks,the so-called differen-tial power analysis (DPA) exploiting the correlation between the instantaneous power consumption and the sensitive in-termediate values of a cryptographic algorithm is one of the most powerful techniques[1].Various countermeasures have been proposed in the literature to make the implementa-tion of cryptographic algorithms immune to DPA.In this study,we focus on the approach called threshold implemen-tation (TI) initially proposed by Nikova et al.[2]at ICICS 2006,which is provable secure against first-order DPA un-der certain leakage assumptions.The TI technique divides the input into several shares by Boolean masking,and the sharing scheme should satisfy three properties:correctness,non-completeness,and uniformity.Correctness states that the sum of output shares equals the correct output.Non-completeness requires each output share tobe computed in-dependent of at least one input share such that the unshared intermediate results are not revealed.Uniformity requires the input shares to be uniformly distributed.Moreover,for an iterative cryptographic algorithm,the output shares should also be uniform for subsequent computations.The TI technique has been widely applied to many symmetric-key cryptographic algorithms.After a series of work,the technique of TI has been largely extended and generalized.
其他文献
Dear editor,rnRecently,considerable attention has been devoted to out-put feedback control and practical tracking of nonlinear sys-tems[1,2].Unfortunately,limitations of sensor techniques can cause sensitivity errors in practical environments.For example,
期刊
The hardware implementation of neural networks based on memristor crossbar array provides a promising paradigm for neuromorphic computing.However,the existence of memristor conductance drift harms the reliability of the deployed neural network,which serio
The success of memory technology is of vital importance in order to handle emerging mass amount of data in our daily lives.Let us take one example here:The IBM summit is the supercomputer released in 2018 and it plays an impor-tant role to help researcher
期刊
Dear editor,Recently, the satellite-integrated Internet of Things(S-IoT)has supported many emergent IoT applications [1], such as smart agriculture, remote healthcare, and environmental monitoring [2]
期刊
The Internet of Things has created an increasing demand for giant magnetoresistive (GMR)sensor owing to its high sensitivity,low power-consumption and small size.A full Wheatstone bridge GMR sensor is fabricated on 6-inch wafers with an annealing process
Dear editor,rnFault-tolerant tracking control has recently become an area of research interest,in which fault detection,fault-tolerant control (FTC),and tracking-control techniques are inte-grated[1,2].It is noteworthy that disturbance is a criti-cal fact
期刊
Graph convolutional networks (GCNs) have been applied successfully in social networks and recommendation systems to analyze graph data.Unlike conventional neural networks,GCNs introduce an aggregation phase,which is both computation-and memory-intensive.T
Dear editor,rnMany complicated real-world systems can be considered as complex networks to analyze their macroscopic properties,e.g.,the Internet,power grids,and communication net-works[1].Recently,studies have found that many real-world networks are coup
期刊
Dear editor,rnThe fractional Fourier transform (FRFT) was proposed by Wiener in 1929.As an important and powerful analyzing tool for time-frequency analysis,the FRFT has been ap-plied in a lot of fields[1,2]such as signal processing,op-tics,radar,and quan
期刊
Dear editor,rnThe study of nonlinear time-delay systems made great progress in the past few decades[1]and some effective meth-ods were presented for special systems such as the approxi-mate linear method,sum of squares decomposition method,and nonlinear m
期刊