Exploration of low-cost configurable S-box designs for AES applications

Jun Hong Chen, Sue Jing Huang, Wen Ching Lin, Yung Kuei Lu, Ming-Der Shieh

研究成果: Conference contribution

5 引文 斯高帕斯(Scopus)

摘要

Realizing AES in hardware faces increasingly more stringent demands for low cost as well as resisting power attacks. For security consideration, countermeasure power analysis approaches to mask sensitive data are needed. The algebraic masking method to protect AES against power attacks is based on various representations of underlying finite fields. However, implementing the transfer matrices between those fields requires a lot of memory spaces. In this paper, we propose a general method for sharing common subexpressions derived from the algebraic finite fields. Furthermore, we present a randomly configurable architecture for protecting SubByte transformation. Analytical results show that the proposed subexpression sharing method can significantly reduce up to 68.75% of memory requirement compared with individual implementations.

原文English
主出版物標題Proceedings of The International Conference on Embedded Software and Systems, ICESS 2008q
頁面422-428
頁數7
DOIs
出版狀態Published - 2008 九月 22
事件2008 International Conference on Embedded Software and Systems, ICESS-08 - Chengdu, Sichuan, China
持續時間: 2008 七月 292008 七月 31

出版系列

名字Proceedings of The International Conference on Embedded Software and Systems, ICESS 2008

Other

Other2008 International Conference on Embedded Software and Systems, ICESS-08
國家China
城市Chengdu, Sichuan
期間08-07-2908-07-31

All Science Journal Classification (ASJC) codes

  • Hardware and Architecture
  • Software

指紋 深入研究「Exploration of low-cost configurable S-box designs for AES applications」主題。共同形成了獨特的指紋。

  • 引用此

    Chen, J. H., Huang, S. J., Lin, W. C., Lu, Y. K., & Shieh, M-D. (2008). Exploration of low-cost configurable S-box designs for AES applications. 於 Proceedings of The International Conference on Embedded Software and Systems, ICESS 2008q (頁 422-428). [4595592] (Proceedings of The International Conference on Embedded Software and Systems, ICESS 2008). https://doi.org/10.1109/ICESS.2008.82