Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions
From MaRDI portal
Publication:5040424
DOI10.1007/978-3-030-42921-8_31zbMath1500.94020OpenAlexW3003412575MaRDI QIDQ5040424
No author found.
Publication date: 14 October 2022
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-42921-8_31
Related Items (2)
Efficient leakage-resilient MACs without idealized assumptions ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Leakage resilience of the duplex construction
- Authenticated encryption with nonce misuse and physical leakage: definitions, separation results and first construction (extended abstract)
- Authenticated encryption in the face of protocol and side channel leakage
- Message Authentication, Revisited
- Domain Extension for MACs Beyond the Birthday Barrier
- Message Authentication Codes from Unpredictable Block Ciphers
- Keying Hash Functions for Message Authentication
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- A Leakage Resilient MAC
- Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited
- Leakage-Resilient Cryptography from Minimal Assumptions
- Very High Order Masking: Efficient Implementation and Security Evaluation
- How Fast Can Higher-Order Masking Be in Software?
- The security of the cipher block chaining message authentication code
This page was built for publication: Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions