Mode-level vs. implementation-level physical security in symmetric cryptography: a practical guide through the leakage-resistance jungle
Triggered by the increasing deployment of embedded cryptographic devices (eg, for the
IoT), the design of authentication, encryption and authenticated encryption schemes …
IoT), the design of authentication, encryption and authenticated encryption schemes …
Spook: Sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher
This paper defines Spook: a sponge-based authenticated encryption with associated data
algorithm. It is primarily designed to provide security against side-channel attacks at a low …
algorithm. It is primarily designed to provide security against side-channel attacks at a low …
TEDT, a leakage-resist AEAD mode for high physical security applications
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode
leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features:(i) It …
leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features:(i) It …
Improved leakage-resistant authenticated encryption based on hardware AES coprocessors
O Bronchain, C Momin, T Peters… - IACR Transactions on …, 2021 - tches.iacr.org
We revisit Unterstein et al.'s leakage-resilient authenticated encryption scheme from CHES
2020. Its main goal is to enable secure software updates by leveraging unprotected (eg …
2020. Its main goal is to enable secure software updates by leveraging unprotected (eg …
Lightweight authenticated encryption mode suitable for threshold implementation
Y Naito, Y Sasaki, T Sugawara - … on the Theory and Applications of …, 2020 - Springer
This paper proposes tweakable block cipher (TBC) based modes PFB\_Plus PFB _ Plus and
PFB ω PFB ω that are efficient in threshold implementations (TI). Let t be an algebraic …
PFB ω PFB ω that are efficient in threshold implementations (TI). Let t be an algebraic …
Applications of timed-release encryption with implicit authentication
A Loe, L Medley, C O'Connell, EA Quaglia - International Conference on …, 2023 - Springer
A whistleblower is a person who leaks sensitive information on a prominent individual or
organisation engaging in an unlawful or immoral activity. Whistleblowing has the potential to …
organisation engaging in an unlawful or immoral activity. Whistleblowing has the potential to …
Towards low-energy leakage-resistant authenticated encryption from the duplex sponge construction
The ongoing NIST lightweight standardization process explicitly puts forward a requirement
of side-channel security, which has renewed the interest for Authenticated Encryption …
of side-channel security, which has renewed the interest for Authenticated Encryption …
Efficient leakage-resilient macs without idealized assumptions
The security proofs of leakage-resilient MACs based on symmetric building blocks currently
rely on idealized assumptions that hardly translate into interpretable guidelines for the …
rely on idealized assumptions that hardly translate into interpretable guidelines for the …
Authenticated encryption with nonce misuse and physical leakage: definitions, separation results and first construction
We propose definitions of authenticated encryption (AE) schemes that offer security
guarantees even in the presence of nonce misuse and side-channel information leakage …
guarantees even in the presence of nonce misuse and side-channel information leakage …
Authenticity in the Presence of Leakage using a Forkcipher
Robust message authentication codes (MACs) and authenticated encryption (AE) schemes
that provide authenticity in the presence of side-channel leakage are essential primitives …
that provide authenticity in the presence of side-channel leakage are essential primitives …