Single-trace side-channel analysis on polynomial-based MAC schemes
DOI10.1007/978-3-030-68773-1_3zbMATH Open1504.94193OpenAlexW3128843667MaRDI QIDQ2106682FDOQ2106682
Authors: Rei Ueno, Kazuhide Fukushima, Yuto Nakano, Shinsaku Kiyomoto, Naofumi Homma
Publication date: 16 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-68773-1_3
Recommendations
- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions
- On weak keys and forgery attacks against polynomial-based MAC schemes
- Cycling attacks on GCM, GHASH and other polynomial MACs and hashes
- On weak keys and forgery attacks against polynomial-based MAC schemes
- Optimal forgeries against polynomial-based MACs and GCM
side-channel analysisauthenticated encryptionmessage authentication codeChaCha20-Poly1305polynomial hash function
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Channel models (including quantum) in information and communication theory (94A40)
Cites Work
- Fast Software Encryption
- New hash functions and their use in authentication and set equality
- Title not available (Why is that?)
- Progress in Cryptology - INDOCRYPT 2004
- Title not available (Why is that?)
- Breaking and repairing GCM security proofs
- Advances in Cryptology - CRYPTO 2003
- Title not available (Why is that?)
- Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
- On weak keys and forgery attacks against polynomial-based MAC schemes
- Soft analytical side-channel attacks
- Nacl on 8-bit AVR microcontrollers
- Algebraic side-channel attacks
- Fast Software Encryption
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- Title not available (Why is that?)
- Improved side-channel analysis of finite-field multiplication
- Side-Channel Analysis of Multiplications in GF(2128)
- Bricklayer attack: a side-channel analysis on the ChaCha quarter round
- Single-trace side-channel attacks on masked lattice-based encryption
- On masked Galois-field multiplication for authenticated encryption resistant to side channel analysis
- Title not available (Why is that?)
- Simple power analysis on AES key expansion revisited
Cited In (2)
Uses Software
This page was built for publication: Single-trace side-channel analysis on polynomial-based MAC schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2106682)