On Secure Embedded Token Design - Information Security Theory and Practice: Security of Mobile and Cyber-Physical Systems Access content directly
Conference Papers Year : 2013

On Secure Embedded Token Design

Simon Hoerder
  • Function : Author
  • PersonId : 1003799
Kimmo Järvinen
  • Function : Author
  • PersonId : 1003800
Daniel Page
  • Function : Author
  • PersonId : 1003801


Within a broader context of mobile and embedded computing, the design of practical, secure tokens that can store and/or process security-critical information remains an ongoing challenge. One aspect of this challenge is the threat of information leakage through side-channel attacks, which is exacerbated by any resource constraints. Along these lines, this paper extends previous work on use of Yao circuits via two contributions. First, we show how careful analysis can fix the maximum number of leakage occurrences observed during a DPA attack, effectively bounding leakage from a Yao-based token. To achieve this we use modularised Yao circuits, which also support our second contribution: the first Yao-based implementation of a secure authentication payload, namely HMAC based on SHA-256.
Fichier principal
Vignette du fichier
978-3-642-38530-8_8_Chapter.pdf (402.75 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-01485937 , version 1 (09-03-2017)





Simon Hoerder, Kimmo Järvinen, Daniel Page. On Secure Embedded Token Design. 7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.112-128, ⟨10.1007/978-3-642-38530-8_8⟩. ⟨hal-01485937⟩
61 View
77 Download



Gmail Facebook X LinkedIn More