Profile PictureOlineNino
€12

FRAGMENTING RANDOM PERMUTATIONS

Add to cart

FRAGMENTING RANDOM PERMUTATIONS

€12

The use of random permutation tables as a side-channel attack

countermeasure was recently proposed by Coron [6]. The countermeasure

operates by ensuring that during the execution of an algorithm,

each intermediate variable that is handled is in a permuted form described

by the random permutation tables. In this paper, we examine the

application of this countermeasure to the AES algorithm as described

Add to cart
Size
197 KB
Length
14 pages
Powered by