€12

FRAGMENTING RANDOM PERMUTATIONS

I want this!

FRAGMENTING RANDOM PERMUTATIONS

€12

The use of random permutation tables as a side-channel attack

countermeasure was recently proposed by Coron [6]. The countermeasure

operates by ensuring that during the execution of an algorithm,

each intermediate variable that is handled is in a permuted form described

by the random permutation tables. In this paper, we examine the

application of this countermeasure to the AES algorithm as described

I want this!
Size
197 KB
Length
14 pages
Powered by