Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
From MaRDI portal
Publication:2096492
DOI10.1007/978-3-030-56784-2_13zbMath1503.94025OpenAlexW3044017192MaRDI QIDQ2096492
Publication date: 9 November 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56784-2_13
Related Items (9)
A stealthy hardware Trojan based on a statistical fault attack ⋮ Security analysis of deterministic re-keying with masking and shuffling: application to ISAP ⋮ \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption ⋮ Systematic study of decryption and re-encryption leakage: the case of Kyber ⋮ \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption ⋮ Efficient leakage-resilient MACs without idealized assumptions ⋮ \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing ⋮ Leakage resilient value comparison with application to message authentication ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
Uses Software
Cites Work
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Masking and leakage-resilient primitives: one, the other(s) or both?
- Boosting authenticated encryption robustness with minimal modifications
- Simple key enumeration (and rank estimation) using histograms: an integrated approach
- Tornado: automatic generation of probing-secure masked bitsliced implementations
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- Sponges resist leakage: the case of authenticated encryption
- Leakage resilience of the duplex construction
- Authenticated encryption with nonce misuse and physical leakage: definitions, separation results and first construction (extended abstract)
- High-resolution EM attacks against leakage-resilient PRFs explained and an improved construction
- Authenticated encryption in the face of protocol and side channel leakage
- ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
- Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions
- Block Ciphers That Are Easier to Mask: How Far Can We Go?
- Leakage-Resilient Symmetric Encryption via Re-keying
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- Simulatable Leakage: Analysis, Pitfalls, and New Constructions
- Soft Analytical Side-Channel Attacks
- LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations
- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy
- Making Masking Security Proofs Concrete
- An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order
- Signatures Resilient to Continual Leakage on Memory and Computation
- Leakage Resilient ElGamal Encryption
- Leakage-Resilient Signatures
- Public-Key Encryption Schemes with Auxiliary Inputs
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
- Securing Computation against Continuous Leakage
- A Provable-Security Treatment of the Key-Wrap Problem
- A Leakage-Resilient Mode of Operation
- Signature Schemes with Bounded Leakage Resilience
- Practical Leakage-Resilient Symmetric Cryptography
- Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint
- Conversion of Security Proofs from One Leakage Model to Another: A New Issue
- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness
- Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note
- Towards sound approaches to counteract power-analysis attacks
- Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions
- On cryptography with auxiliary input
- Power Analysis Attacks
- Multiparty computation secure against continual memory leakage
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
- Advances in Cryptology - CRYPTO 2003
- Fast Software Encryption
- Topics in Cryptology – CT-RSA 2005
- How Fast Can Higher-Order Masking Be in Software?
- Public-Key Cryptosystems Resilient to Key Leakage
- Applied Cryptography and Network Security
- Topics in Cryptology – CT-RSA 2004
- Theory of Cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle