Design Trade-offs in Threshold Implementations

2019 
With the expansion of the IoT and the emergence of vast amounts of remote hardware devices side-channel attacks pose a serious threat, requiring adequate protection. Among the hardware countermeasures, Threshold Implementations (TI) is one of the most used ones. It is designed to avoid the leakage of sensitive data from hardware designs. In this work, we examine the cost of applying TI to the block cipher PRINCE with respect to the latency, power/energy consumption, occupied area. We explore different versions of TI with respect to the security order and TI variations, and compare the strengths and weaknesses of each approach.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    7
    References
    1
    Citations
    NaN
    KQI
    []