On secure embedded token design: Quasi-looped Yao circuits and bounded leakage

Simon Hoerder, Kimmo Järvinen, Daniel Page

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)


Within a broader context of mobile and embedded computing, the design of practical, secure tokens that can store and/or process security-critical information remains an ongoing challenge. One aspect of this challenge is the threat of information leakage through side-channel attacks, which is exacerbated by any resource constraints. Along these lines, this paper extends previous work on use of Yao circuits via two contributions. First, we show how careful analysis can fix the maximum number of leakage occurrences observed during a DPA attack, effectively bounding leakage from a Yao-based token. To achieve this we use modularised Yao circuits, which also support our second contribution: the first Yao-based implementation of a secure authentication payload, namely HMAC based on SHA-256.
Original languageEnglish
Title of host publicationWorkshop in Information Security Theory and Practice - WISTP 2013
PublisherSpringer Berlin Heidelberg
Publication statusPublished - 2013


Dive into the research topics of 'On secure embedded token design: Quasi-looped Yao circuits and bounded leakage'. Together they form a unique fingerprint.

Cite this