Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
From MaRDI portal
Publication:3558318
DOI10.1007/978-3-642-12678-9_17zbMath1284.94095DBLPconf/africacrypt/MedwedSGR10OpenAlexW2150892302WikidataQ58765176 ScholiaQ58765176MaRDI QIDQ3558318
Johann Großschädl, Marcel Medwed, Francesco Regazzoni, François-Xavier Standaert
Publication date: 4 May 2010
Published in: Progress in Cryptology – AFRICACRYPT 2010 (Search for Journal in Brave)
Full work available at URL: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.890.7721
Cryptography (94A60) Hardware implementations of nonnumerical algorithms (VLSI algorithms, etc.) (68W35)
Related Items (11)
A Leakage Resilient MAC ⋮ Information-combining differential fault attacks on DEFAULT ⋮ On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages ⋮ \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption ⋮ \textsf{ISAP+}: \textsf{ISAP} with fast authentication ⋮ Keymill: side-channel resilient key generator, a new concept for SCA-security by design ⋮ Learning with physical rounding for linear and quadratic leakage functions ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ A new birthday-type algorithm for attacking the fresh re-keying countermeasure ⋮ Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
This page was built for publication: Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices