Lightweight authenticated encryption mode suitable for threshold implementation
From MaRDI portal
Recommendations
- Improving first-order threshold implementations of \textsf{SKINNY}
- Threshold implementations of small S-boxes
- A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not
- Blockcipher-based authenticated encryption: how small can we go?
- A more efficient AES threshold implementation
Cites work
- scientific article; zbMATH DE number 1088930 (Why is no real title available?)
- A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not
- A new variant of PMAC: beyond the birthday bound
- A practical forgery attack on Lilliput-AE
- Advances in Cryptology - CRYPTO 2003
- Authenticated encryption in the face of protocol and side channel leakage
- Authenticated encryption with nonce misuse and physical leakage: definitions, separation results and first construction (extended abstract)
- Beyond conventional security in sponge-based authenticated encryption modes
- Ciphers for MPC and FHE
- Constructing TI-friendly substitution boxes using shift-invariant permutations
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- How to use metaheuristics for design of symmetric-key primitives
- Leakage resilience of the duplex construction
- Masking AES with \(d+1\) shares in hardware
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- Pushing the limits: a very compact and a threshold implementation of AES
- Reducing the cost of authenticity with leakages: a CIML2-secure AE scheme with one call to a strongly protected tweakable block cipher
- Related-key impossible-differential attack on reduced-round \textsc{Skinny}
- Side-channel resistant crypto for less than 2,300 GE
- Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy
- Sponges resist leakage: the case of authenticated encryption
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- The software performance of authenticated-encryption modes
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Uniform first-order threshold implementations
Cited in
(7)- Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
- Blockcipher-based authenticated encryption: how small can we go?
- \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption
- Double-block-length hash function for minimum memory size
- On the security of triplex- and multiplex-type constructions with smaller tweaks
- Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
- Secret can be public: low-memory AEAD mode for high-order masking
This page was built for publication: Lightweight authenticated encryption mode suitable for threshold implementation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2119030)