Skip to main content

Table 1 Intermediate and extra variables of Algorithm 3

From: A secure and highly efficient first-order masking scheme for AES linear operations

l

Il

Steps

1

s, GF256MUL2(s)

1,3,5

2

ST

3,5,6

3

t, tmp, GF256MUL2(tmp)

3,5,6

4

\(ST[i]\oplus s, \bigoplus _{i}{ST[i]}\oplus GF256MUL2(s)\)

3,5,6

5

GF256MUL2(tmp)⊕ST[i]

6

l

EIl

Steps

1

<t,ST[4(i+1)]>

3

2

<tmp,ST[4i+(j+1)]>

5