Sept. 5, 2022, 6:06 p.m. |

IACR News www.iacr.org

ePrint Report: An Optimal Universal Construction for the Threshold Implementation of Bijective S-boxes

Enrico Piccione, Samuele Andreoli, Lilya Budaghyan, Claude Carlet, Siemen Dhooghe, Svetla Nikova, George Petrides, Vincent Rijmen


Threshold implementation is a method based on secret sharing to secure cryptographic ciphers (and in particular S-boxes) against differential power analysis. Until now, threshold implementations were only constructed for specific types of functions and some small S-boxes, but no general construction for all S-boxes was ever presented. The lower bound for …

construction eprint report

Information Security Engineers

@ D. E. Shaw Research | New York City

Cyber Security Professional

@ BT Group | 25A DLF City Phase-III,, Gurugram, India

Head of Cyber Security Operations

@ Vector Limited | Auckland, New Zealand

Security Analyst (SOC)

@ Accesa & RaRo | Cluj-Napoca, Romania

Senior - IT Compliance-Cyber (Technology Risk Consulting)

@ EY | Bengaluru, KA, IN, 560016

Security Automation Engineer Internship - Secure Development Team Product Security (Brno, Czech Republic)

@ Red Hat | Brno, Czechia