Authenticated encryption schemes: A systematic review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …
confidentiality and integrity. A considerable amount of research has been devoted to the …
On the success rate of side-channel attacks on masked implementations: information-theoretical bounds and their practical usage
This study derives information-theoretical bounds of the success rate (SR) of side-channel
attacks on masked implementations. We first develop a communication channel model …
attacks on masked implementations. We first develop a communication channel model …
Improved leakage-resistant authenticated encryption based on hardware AES coprocessors
O Bronchain, C Momin, T Peters… - IACR Transactions on …, 2021 - tches.iacr.org
We revisit Unterstein et al.'s leakage-resilient authenticated encryption scheme from CHES
2020. Its main goal is to enable secure software updates by leveraging unprotected (eg …
2020. Its main goal is to enable secure software updates by leveraging unprotected (eg …
Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme
This paper presents a provably secure, higher-order, and leakage-resilient (LR) rekeying
scheme named LR Rekeying with Random oracle Repetition (LR4), along with a …
scheme named LR Rekeying with Random oracle Repetition (LR4), along with a …
Efficient leakage-resilient macs without idealized assumptions
The security proofs of leakage-resilient MACs based on symmetric building blocks currently
rely on idealized assumptions that hardly translate into interpretable guidelines for the …
rely on idealized assumptions that hardly translate into interpretable guidelines for the …
Constructing Committing and Leakage-Resilient Authenticated Encryption
P Struck, M Weishäupl - IACR Transactions on Symmetric Cryptology, 2024 - tosc.iacr.org
The main goal of this work is to construct authenticated encryption (AE) hat is both
committing and leakage-resilient. As a first approach for this we consider generic …
committing and leakage-resilient. As a first approach for this we consider generic …
Retrofitting leakage resilient authenticated encryption to microcontrollers
F Unterstein, M Schink, T Schamberger… - IACR Transactions on …, 2020 - tches.iacr.org
The security of Internet of Things (IoT) devices relies on fundamental concepts such as
cryptographically protected firmware updates. In this context attackers usually have physical …
cryptographically protected firmware updates. In this context attackers usually have physical …
A modular approach to the incompressibility of block-cipher-based AEADs
Incompressibility is one of the most fundamental security goals in white-box cryptography.
Given recent advances in the design of efficient and incompressible block ciphers such as …
Given recent advances in the design of efficient and incompressible block ciphers such as …
Parallel sponge-based authenticated encryption with side-channel protection and adversary-invisible nonces
Since its birth in 2000, authenticated encryption (AE) has been a hot research topic, and
many new features have been proposed to boost its security or performance. The Block …
many new features have been proposed to boost its security or performance. The Block …
SCA secure and updatable crypto engines for FPGA SoC bitstream decryption: extended version
FPGA system on chips (SoCs) are ideal computing platforms for edge devices in
applications which require high performance through hardware acceleration and …
applications which require high performance through hardware acceleration and …