Leakage resilient value comparison with application to message authentication
From MaRDI portal
Publication:2056738
DOI10.1007/978-3-030-77886-6_13zbMath1479.94311OpenAlexW3157476615MaRDI QIDQ2056738
Christoph Dobraunig, Bart Mennink
Publication date: 8 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-77886-6_13
Related Items (3)
\textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption ⋮ Secret can be public: low-memory AEAD mode for high-order masking ⋮ Efficient leakage-resilient MACs without idealized assumptions
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Full-state keyed duplex with built-in multi-user support
- A note on the chi-square method: a tool for proving cryptographic security
- \textsc{Friet}: an authenticated encryption scheme with built-in fault detection
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- Leakage resilience of the duplex construction
- Linking Stam's bounds with generalized truncation
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions
- Block Ciphers That Are Easier to Mask: How Far Can We Go?
- LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations
- Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF
- The Software Performance of Authenticated-Encryption Modes
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
- Provably Secure Higher-Order Masking of AES
- A Leakage-Resilient Mode of Operation
- Distance between sampling with and without replacement
- Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
- Practical Leakage-Resilient Symmetric Cryptography
- Towards sound approaches to counteract power-analysis attacks
- Reconciling $$d+1$$ Masking in Hardware and Software
- Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing
- Advances in Cryptology - CRYPTO 2003
- On the Indifferentiability of the Sponge Construction
- Progress in Cryptology - INDOCRYPT 2004
This page was built for publication: Leakage resilient value comparison with application to message authentication