Bernstein, D. J. (2008). The Salsa20 Family of Stream Ci-
phers. In Robshaw, M. J. B. and Billet, O., editors,
New Stream Cipher Designs - The eSTREAM Final-
ists, volume 4986 of Lecture Notes in Computer Sci-
ence, pages 84–97. Springer.
Bernstein, D. J., K
¨
olbl, S., Lucks, S., Massolino, P. M. C.,
Mendel, F., Nawaz, K., Schneider, T., Schwabe, P.,
Standaert, F.-X., Todo, Y., and Viguier, B. (2017).
Gimli : A cross-platform permutation. In Fischer,
W. and Homma, N., editors, Cryptographic Hardware
and Embedded Systems – CHES 2017, pages 299–
320, Cham. Springer International Publishing.
Biryukov, A., Dinu, D., and Großsch
¨
adl, J. (2016). Cor-
relation power analysis of lightweight block ciphers:
From theory to practice. In Manulis, M., Sadeghi,
A., and Schneider, S., editors, Applied Cryptogra-
phy and Network Security - 14th International Confer-
ence, ACNS 2016, Guildford, UK, June 19-22, 2016.
Proceedings, volume 9696 of Lecture Notes in Com-
puter Science, pages 537–557. Springer.
Biryukov, A. and Perrin, L. (2017). State of the art in
lightweight symmetric cryptography. IACR Cryptol-
ogy ePrint Archive, 2017:511.
Bogdanov, A. (2007). Improved side-channel collision at-
tacks on AES. In Adams, C. M., Miri, A., and Wiener,
M. J., editors, Selected Areas in Cryptography, 14th
International Workshop, SAC 2007, Ottawa, Canada,
August 16-17, 2007, Revised Selected Papers, volume
4876 of Lecture Notes in Computer Science, pages
84–95. Springer.
Dinu, D., Perrin, L., Udovenko, A., Velichkov, V.,
Großsch
¨
adl, J., and Biryukov, A. (2016). Design
strategies for ARX with provable bounds: SPARX
and LAX. In Cheon, J. H. and Takagi, T., editors,
Advances in Cryptology - ASIACRYPT 2016 - 22nd
International Conference on the Theory and Applica-
tion of Cryptology and Information Security, Hanoi,
Vietnam, December 4-8, 2016, Proceedings, Part I,
volume 10031 of Lecture Notes in Computer Science,
pages 484–513.
Ferguson, N., Lucks, S., Schneier, B., Whiting, D., Bel-
lare, M., Kohno, T., Callas, J., and Walker, J. (2010).
The Skein hash function family. Submission to NIST
(round 3), 7(7.5):3.
Jungk, B., Petri, R., and St
¨
ottinger, M. (2018). Effi-
cient side-channel protections of ARX ciphers. IACR
Transactions on Cryptographic Hardware and Em-
bedded Systems, 2018(3):627–653.
Mangard, S., Oswald, E., and Popp, T. (2007). Power
analysis attacks - revealing the secrets of smart cards.
Springer.
Moradi, A., Mischke, O., and Eisenbarth, T. (2010).
Correlation-enhanced power analysis collision attack.
In Mangard, S. and Standaert, F., editors, Crypto-
graphic Hardware and Embedded Systems, CHES
2010, 12th International Workshop, Santa Barbara,
CA, USA, August 17-20, 2010. Proceedings, volume
6225 of Lecture Notes in Computer Science, pages
125–139. Springer.
Nir, Y. and Langley, A. (2015). ChaCha20 and Poly1305
for IETF Protocols. RFC 7539 (Informational).
Prouff, E. (2005). DPA attacks and s-boxes. In Fast Soft-
ware Encryption: 12th International Workshop, FSE
2005, Paris, France, February 21-23, 2005, Revised
Selected Papers, pages 424–441.
Schneider, T., Moradi, A., and G
¨
uneysu, T. (2015). Arith-
metic addition over boolean masking - towards first-
and second-order resistance in hardware. In Applied
Cryptography and Network Security - 13th Interna-
tional Conference, ACNS 2015, New York, NY, USA,
June 2-5, 2015, Revised Selected Papers, pages 559–
578.
Schramm, K., Leander, G., Felke, P., and Paar, C. (2004).
A collision-attack on AES: combining side channel-
and differential-attack. In Joye, M. and Quisquater, J.,
editors, Cryptographic Hardware and Embedded Sys-
tems - CHES 2004: 6th International Workshop Cam-
bridge, MA, USA, August 11-13, 2004. Proceedings,
volume 3156 of Lecture Notes in Computer Science,
pages 163–175. Springer.
Shimizu, A. and Miyaguchi, S. (1988). FEAL - fast data
encipherment algorithm. Systems and Computers in
Japan, 19(7):20–34.
Yan, Y. and Oswald, E. (2019). Examining the practical
side channel resilience of ARX-boxes. In Palumbo,
F., Becchi, M., Schulz, M., and Sato, K., editors, Pro-
ceedings of the 16th ACM International Conference
on Computing Frontiers, CF 2019, Alghero, Italy,
April 30 - May 2, 2019., pages 373–379. ACM.
Zohner, M., Kasper, M., and St
¨
ottinger, M. (2012).
Butterfly-attack on Skein’s modular addition. In
Schindler, W. and Huss, S. A., editors, Construc-
tive Side-Channel Analysis and Secure Design - Third
International Workshop, COSADE 2012, Darmstadt,
Germany, May 3-4, 2012. Proceedings, volume 7275
of Lecture Notes in Computer Science, pages 215–
230. Springer.
An Analytic Attack against ARX Addition Exploiting Standard Side-channel Leakage
97