\texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption
From MaRDI portal
Publication:6091130
DOI10.1007/978-3-031-31368-4_5zbMath1527.94046MaRDI QIDQ6091130
No author found.
Publication date: 24 November 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Related Items
Cites Work
- Unnamed Item
- Secure hardware implementation of nonlinear functions in the presence of glitches
- On the concrete hardness of learning with errors
- Exploring crypto dark matter: new simple PRF candidates and their applications
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
- Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
- A modular analysis of the Fujisaki-Okamoto transformation
- Improved side-channel analysis of finite-field multiplication
- Efficient authentication from hard learning problems
- Secure integration of asymmetric and symmetric encryption schemes
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
- (One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemes
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- Authenticated encryption with nonce misuse and physical leakage: definitions, separation results and first construction (extended abstract)
- Decryption failure attacks on IND-CCA secure lattice-based schemes
- Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems
- Pseudorandom Functions and Lattices
- Side-Channel Analysis of Multiplications in GF(2128)
- Soft Analytical Side-Channel Attacks
- Higher-Order Side Channel Security and Mask Refreshing
- Making Masking Security Proofs Concrete
- Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
- Random Oracles in a Quantum World
- Hardware Private Circuits: From Trivial Composition to Full Verification
- Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
- On Ideal Lattices and Learning with Errors over Rings
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Compact McEliece keys based on quasi-dyadic Srivastava codes
- Conversion of Security Proofs from One Leakage Model to Another: A New Issue
- Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note
- Power Analysis Attacks
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
- Advances in Cryptology - CRYPTO 2003
- Worst‐Case to Average‐Case Reductions Based on Gaussian Measures
- : Increasing the Security and Efficiency of
- Topics in Cryptology – CT-RSA 2005
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- On lattices, learning with errors, random linear codes, and cryptography
This page was built for publication: \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption