Advances in Cryptology - CRYPTO 2003

From MaRDI portal
Publication:5428136

DOI10.1007/b11817zbMath1122.94378OpenAlexW2480001466WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428136

David Wagner, Yuval Ishai, Amit Sahai

Publication date: 28 November 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b11817




Related Items

Effective and efficient masking with low noise using small-Mersenne-prime ciphersA further study on bridge structures and constructing bijective S-boxes for low-latency maskingA holistic approach towards side-channel secure fixed-weight polynomial samplingProvable secure software masking in the real-worldSystematic study of decryption and re-encryption leakage: the case of KyberRemoving the field size loss from Duc et al.'s conjectured bound for masked encodings\texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryptionA key-recovery attack against Mitaka in the \(t\)-probing modelShort leakage resilient and non-malleable secret sharing schemesSecret can be public: low-memory AEAD mode for high-order maskingA modular approach to the incompressibility of block-cipher-based AEADsHigher-order masking scheme for Trivium hardware implementationMind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage modelCombined fault and leakage resilience: composability, constructions and compilerSecure and efficient software masking on superscalar pipelined processorsDivided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacksDynamic random probing expansion with quasi linear asymptotic complexityAnalyzing masked ciphers against transition and coupling effectsImproving first-order threshold implementations of \textsf{SKINNY}Tight bounds on the randomness complexity of secure multiparty computationEfficiently masking polynomial inversion at arbitrary orderSecure Implementation of Lattice-Based Encryption SchemesUniversal hashing based on field multiplication and (near-)MDS matricesNew bounds on the local leakage resilience of Shamir's secret sharing schemeLearning with physical rounding for linear and quadratic leakage functionsUnifying freedom and separation for tight probing-secure compositionParallel Implementations of Masking Schemes and the Bounded Moment Leakage ModelHow Fast Can Higher-Order Masking Be in Software?Codes for Side-Channel Attacks and ProtectionsMasking the GLP lattice-based signature scheme at any orderThe Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise AppearanceOn the local leakage resilience of linear secret sharing schemesUnconditionally secure computation against low-complexity leakageConstructing tree decompositions of graphs with bounded gonalityCorrection to: ``Unconditionally secure computation against low-complexity leakageDifferential Bias Attack for Block Cipher Under Randomized Leakage with Key EnumerationMonomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended versionTowards tight random probing securitySecure wire shuffling in the probing modelAdaptive extractors and their application to leakage resilient secret sharingResilient uniformity: applying resiliency in maskingCorrelation power analysis and higher-order masking implementation of WAGEHow to Compute in the Presence of LeakageLeakage-resilient cryptography from minimal assumptionsLeakage Resilient One-Way Functions: The Auxiliary-Input SettingSecurity analysis of deterministic re-keying with masking and shuffling: application to ISAPProving SIFA protection of masked redundant circuitsAnother step towards realizing random oracles: non-malleable point obfuscationThe wonderful world of global random oraclesHomomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more dataFully leakage-resilient signaturesPrivate circuits with quasilinear randomness\textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}Higher-Order Side Channel Security and Mask RefreshingMasking Tables—An Underestimated Security RiskCUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to MaskUnifying Leakage Classes: Simulatable Leakage and PseudoentropyWeakening the Isolation Assumption of Tamper-Proof Hardware TokensLeakage Resilience of the Blom’s Key Distribution SchemeThreshold implementations of small S-boxesMasking and leakage-resilient primitives: one, the other(s) or both?Spin me right round rotational symmetry for FPGA-specific AES: extended versionTaylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled ImplementationsUnknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRFStrong continuous non-malleable encoding schemes with tamper-detectionAll the AES you need on Cortex-M3 and M4Succinct Diophantine-satisfiability argumentsBeyond birthday bound secure fresh rekeying: application to authenticated encryptionSILVER -- statistical independence and leakage verificationCryptanalysis of masked ciphers: a not so random ideaPacked multiplication: how to amortize the cost of side-channel masking?Trojan-resilience without cryptographyAn Efficient Side-Channel Protected AES Implementation with Arbitrary Protection OrderUnifying leakage models: from probing attacks to noisy leakageSecure hardware implementation of nonlinear functions in the presence of glitchesSecurity Evaluation Against Side-Channel Analysis at Compilation TimeReducing Randomness Complexity of Mask Refreshing AlgorithmSecure Multiplication for Bitslice Higher-Order Masking: Optimisation and ComparisonVectorizing Higher-Order MaskingOn Masked Galois-Field Multiplication for Authenticated Encryption Resistant to Side Channel AnalysisProtecting Triple-DES Against DPAThreshold Implementation in SoftwareA First-Order SCA Resistant AES Without Fresh RandomnessInterleaved Group ProductsExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationNon-Malleable Codes from Additive CombinatoricsCompositional Synthesis of Leakage Resilient ProgramsDetecting Flawed Masking Schemes with Leakage Detection TestsMontgomery’s Trick and Fast Implementation of Masked AESTamper-Proof Circuits: How to Trade Leakage for Tamper-ResilienceMinimizing locality of one-way functions via semi-private randomized encodingsStatistical properties of side-channel and fault injection attacks using coding theoryOn the Connection between Leakage Tolerance and Adaptive SecurityLeakage-resilient coin tossingClassical leakage resilience from fault-tolerant quantum computationMaking masking security proofs concrete (or how to evaluate the security of any leaking device), extended versionPrivate Circuits II: Keeping Secrets in Tamperable CircuitsOne-Time ProgramsHigher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEONLeakage resilient one-way functions: the auxiliary-input settingCharacterization and enumeration of complementary dual abelian codesLeakage-Resilient Cryptography over Large Finite Fields: Theory and PracticeMaking the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient CircuitsOptimal Amplification of Noisy LeakagesQRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA ImplementationsSecure Hardware Implementation of Non-linear Functions in the Presence of GlitchesPolynomial Evaluation and Side Channel AnalysisCryptography without (Hardly Any) Secrets ?A Unified Framework for the Analysis of Side-Channel Key Recovery AttacksA Leakage-Resilient Mode of OperationLocally decodable and updatable non-malleable codes and their applicationsFault template attacks on block ciphers exploiting fault propagationTornado: automatic generation of probing-secure masked bitsliced implementationsSide-channel masking with pseudo-random generator\textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fieldsDummy shuffling against algebraic attacks in white-box implementationsFast verification of masking schemes in characteristic twoOn the power of expansion: more efficient constructions in the random probing modelLeakage-resilience of the Shamir secret-sharing scheme against physical-bit leakagesLeakage resilient value comparison with application to message authenticationThe mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for freeDeterministic Public-Key Encryption Under Continual LeakageLeakage-Resilient Coin TossingTowards Sound Fresh Re-keying with Hard (Physical) Learning ProblemsBounded Indistinguishability and the Complexity of Recovering SecretsFounding Cryptography on Tamper-Proof Hardware TokensLeakage-Resilient SignaturesPublic-Key Encryption Schemes with Auxiliary InputsIdentity-based broadcast encryption with continuous leakage resilienceRandom probing security: verification, composition, expansion and new constructionsMode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungleLeakage-resilient key exchange and two-seed extractorsReverse firewalls for actively secure MPCsSingle-trace side-channel analysis on polynomial-based MAC schemesCustom instruction support for modular defense against side-channel and fault attacksLightweight authenticated encryption mode suitable for threshold implementation




This page was built for publication: Advances in Cryptology - CRYPTO 2003