Mode-level vs. implementation-level physical security in symmetric cryptography: a practical guide through the leakage-resistance jungle

D Bellizia, O Bronchain, G Cassiers, V Grosso… - Advances in Cryptology …, 2020 - Springer
Triggered by the increasing deployment of embedded cryptographic devices (eg, for the
IoT), the design of authentication, encryption and authenticated encryption schemes …

Spook: Sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher

D Bellizia, F Berti, O Bronchain, G Cassiers… - IACR Transactions on …, 2020 - inria.hal.science
This paper defines Spook: a sponge-based authenticated encryption with associated data
algorithm. It is primarily designed to provide security against side-channel attacks at a low …

TEDT, a leakage-resist AEAD mode for high physical security applications

F Berti, C Guo, O Pereira, T Peters… - IACR Transactions on …, 2020 - tches.iacr.org
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode
leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features:(i) It …

Improved leakage-resistant authenticated encryption based on hardware AES coprocessors

O Bronchain, C Momin, T Peters… - IACR Transactions on …, 2021 - tches.iacr.org
We revisit Unterstein et al.'s leakage-resilient authenticated encryption scheme from CHES
2020. Its main goal is to enable secure software updates by leveraging unprotected (eg …

Lightweight authenticated encryption mode suitable for threshold implementation

Y Naito, Y Sasaki, T Sugawara - … on the Theory and Applications of …, 2020 - Springer
This paper proposes tweakable block cipher (TBC) based modes PFB\_Plus PFB _ Plus and
PFB ω PFB ω that are efficient in threshold implementations (TI). Let t be an algebraic …

Applications of timed-release encryption with implicit authentication

A Loe, L Medley, C O'Connell, EA Quaglia - International Conference on …, 2023 - Springer
A whistleblower is a person who leaks sensitive information on a prominent individual or
organisation engaging in an unlawful or immoral activity. Whistleblowing has the potential to …

Towards low-energy leakage-resistant authenticated encryption from the duplex sponge construction

C Guo, O Pereira, T Peters, FX Standaert - Cryptology ePrint Archive, 2019 - eprint.iacr.org
The ongoing NIST lightweight standardization process explicitly puts forward a requirement
of side-channel security, which has renewed the interest for Authenticated Encryption …

Efficient leakage-resilient macs without idealized assumptions

F Berti, C Guo, T Peters, FX Standaert - … on the Theory and Application of …, 2021 - Springer
The security proofs of leakage-resilient MACs based on symmetric building blocks currently
rely on idealized assumptions that hardly translate into interpretable guidelines for the …

Authenticated encryption with nonce misuse and physical leakage: definitions, separation results and first construction

C Guo, O Pereira, T Peters, FX Standaert - … de Chile, Chile, October 2–4 …, 2019 - Springer
We propose definitions of authenticated encryption (AE) schemes that offer security
guarantees even in the presence of nonce misuse and side-channel information leakage …

Authenticity in the Presence of Leakage using a Forkcipher

F Berti, FX Standaert, I Levi - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Robust message authentication codes (MACs) and authenticated encryption (AE) schemes
that provide authenticity in the presence of side-channel leakage are essential primitives …