Skip to main content

Table 1 Intermediate and extra variables of Algorithm 3

From: A secure and highly efficient first-order masking scheme for AES linear operations

l Il Steps
1 s, GF256MUL2(s) 1,3,5
2 ST 3,5,6
3 t, tmp, GF256MUL2(tmp) 3,5,6
4 \(ST[i]\oplus s, \bigoplus _{i}{ST[i]}\oplus GF256MUL2(s)\) 3,5,6
5 GF256MUL2(tmp)ST[i] 6
l EIl Steps
1 <t,ST[4(i+1)]> 3
2 <tmp,ST[4i+(j+1)]> 5