Authenticated encryption schemes: A systematic review

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022 - ieeexplore.ieee.org
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …

On the success rate of side-channel attacks on masked implementations: information-theoretical bounds and their practical usage

A Ito, R Ueno, N Homma - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
This study derives information-theoretical bounds of the success rate (SR) of side-channel
attacks on masked implementations. We first develop a communication channel model …

Improved leakage-resistant authenticated encryption based on hardware AES coprocessors

O Bronchain, C Momin, T Peters… - IACR Transactions on …, 2021 - tches.iacr.org
We revisit Unterstein et al.'s leakage-resilient authenticated encryption scheme from CHES
2020. Its main goal is to enable secure software updates by leveraging unprotected (eg …

Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme

R Ueno, N Homma, A Inoue… - IACR Transactions on …, 2024 - tches.iacr.org
This paper presents a provably secure, higher-order, and leakage-resilient (LR) rekeying
scheme named LR Rekeying with Random oracle Repetition (LR4), along with a …

Efficient leakage-resilient macs without idealized assumptions

F Berti, C Guo, T Peters, FX Standaert - … on the Theory and Application of …, 2021 - Springer
The security proofs of leakage-resilient MACs based on symmetric building blocks currently
rely on idealized assumptions that hardly translate into interpretable guidelines for the …

Constructing Committing and Leakage-Resilient Authenticated Encryption

P Struck, M Weishäupl - IACR Transactions on Symmetric Cryptology, 2024 - tosc.iacr.org
The main goal of this work is to construct authenticated encryption (AE) hat is both
committing and leakage-resilient. As a first approach for this we consider generic …

Retrofitting leakage resilient authenticated encryption to microcontrollers

F Unterstein, M Schink, T Schamberger… - IACR Transactions on …, 2020 - tches.iacr.org
The security of Internet of Things (IoT) devices relies on fundamental concepts such as
cryptographically protected firmware updates. In this context attackers usually have physical …

A modular approach to the incompressibility of block-cipher-based AEADs

A Hosoyamada, T Isobe, Y Todo, K Yasuda - International Conference on …, 2022 - Springer
Incompressibility is one of the most fundamental security goals in white-box cryptography.
Given recent advances in the design of efficient and incompressible block ciphers such as …

Parallel sponge-based authenticated encryption with side-channel protection and adversary-invisible nonces

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022 - ieeexplore.ieee.org
Since its birth in 2000, authenticated encryption (AE) has been a hot research topic, and
many new features have been proposed to boost its security or performance. The Block …

SCA secure and updatable crypto engines for FPGA SoC bitstream decryption: extended version

F Unterstein, N Jacob, N Hanley, C Gu… - Journal of Cryptographic …, 2021 - Springer
FPGA system on chips (SoCs) are ideal computing platforms for edge devices in
applications which require high performance through hardware acceleration and …