Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
From MaRDI portal
Publication:2106709
DOI10.1007/978-3-030-68773-1_15zbMath1504.94163OpenAlexW3013384204MaRDI QIDQ2106709
Juliane Krämer, Patrick Struck
Publication date: 16 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-68773-1_15
Related Items (4)
A modular approach to the incompressibility of block-cipher-based AEADs ⋮ Efficient leakage-resilient MACs without idealized assumptions ⋮ Sponge-based authenticated encryption: security against quantum attackers ⋮ Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
Cites Work
- Unnamed Item
- Boosting authenticated encryption robustness with minimal modifications
- Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
- Sponges resist leakage: the case of authenticated encryption
- Leakage resilience of the duplex construction
- Authenticated encryption with nonce misuse and physical leakage: definitions, separation results and first construction (extended abstract)
- Authenticated encryption in the face of protocol and side channel leakage
- Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions
- Leakage-Resilient Symmetric Encryption via Re-keying
- Simulatable Leakage: Analysis, Pitfalls, and New Constructions
- Rogue Decryption Failures: Reconciling AE Robustness Notions
- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Practical Leakage-Resilient Symmetric Cryptography
- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness
- Towards sound approaches to counteract power-analysis attacks
- Theory of Cryptography
This page was built for publication: Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions