Welcome to the resource topic for 2002/091
Multiplicative Masking and Power Analysis of AES
Authors: Jovan Dj. GolićAbstract:
The recently proposed multiplicative masking countermeasure against power
analysis attacks on AES is interesting as it does not require the costly recomputation and RAM storage
of S-boxes for every run of AES. This is important for applications where the
available space is very limited such as the smart card applications.
Unfortunately, it is here shown that this method is
in fact inherently vulnerable to differential power analysis.
Other possible random masking methods are also discussed.
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .