\textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption
From MaRDI portal
Publication:2146096
DOI10.1007/978-3-030-88238-9_14zbMath1491.94057OpenAlexW3208319857MaRDI QIDQ2146096
Publication date: 15 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-88238-9_14
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Boosting authenticated encryption robustness with minimal modifications
- Leakage resilient value comparison with application to message authentication
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- Lightweight authenticated encryption mode suitable for threshold implementation
- Sponges resist leakage: the case of authenticated encryption
- Leakage resilience of the duplex construction
- Optimally indifferentiable double-block-length hashing without post-processing and with support for longer key than single block
- Authenticated encryption with nonce misuse and physical leakage: definitions, separation results and first construction (extended abstract)
- Authenticated encryption in the face of protocol and side channel leakage
- Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Simulatable Leakage: Analysis, Pitfalls, and New Constructions
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- A Provable-Security Treatment of the Key-Wrap Problem
- Some Plausible Constructions of Double-Block-Length Hash Functions
- Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note
- Towards sound approaches to counteract power-analysis attacks
- On cryptography with auxiliary input
- Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali
- A Simple Variant of the Merkle-Damgård Scheme with a Permutation
- Reconsidering Generic Composition
- Theory of Cryptography
- One Way Hash Functions and DES
This page was built for publication: \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption