Single-trace side-channel analysis on polynomial-based MAC schemes
From MaRDI portal
Publication:2106682
DOI10.1007/978-3-030-68773-1_3zbMath1504.94193OpenAlexW3128843667MaRDI QIDQ2106682
Yuto Nakano, Rei Ueno, Naofumi Homma, Kazuhide Fukushima, Shinsaku Kiyomoto
Publication date: 16 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-68773-1_3
side-channel analysisauthenticated encryptionmessage authentication codeChaCha20-Poly1305polynomial hash function
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Channel models (including quantum) in information and communication theory (94A40)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On weak keys and forgery attacks against polynomial-based MAC schemes
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- New hash functions and their use in authentication and set equality
- Improved side-channel analysis of finite-field multiplication
- Bricklayer attack: a side-channel analysis on the ChaCha quarter round
- Breaking and Repairing GCM Security Proofs
- Side-Channel Analysis of Multiplications in GF(2128)
- Soft Analytical Side-Channel Attacks
- Algebraic Side-Channel Attacks
- On Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel Analysis
- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
- Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
- NaCl on 8-Bit AVR Microcontrollers
- Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
- Simple Power Analysis on AES Key Expansion Revisited
- Advances in Cryptology - CRYPTO 2003
- Fast Software Encryption
- Progress in Cryptology - INDOCRYPT 2004
- Fast Software Encryption
This page was built for publication: Single-trace side-channel analysis on polynomial-based MAC schemes