Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
From MaRDI portal
Publication:2106709
Recommendations
- Sponges resist leakage: the case of authenticated encryption
- Authenticated encryption in the face of protocol and side channel leakage
- Practical leakage-resilient symmetric cryptography
- Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks
- A Leakage-Resilient Mode of Operation
Cites work
- scientific article; zbMATH DE number 1583804 (Why is no real title available?)
- Authenticated encryption in the face of protocol and side channel leakage
- Authenticated encryption with nonce misuse and physical leakage: definitions, separation results and first construction (extended abstract)
- Boosting authenticated encryption robustness with minimal modifications
- Leakage resilience of the duplex construction
- Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
- Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks
- Leakage-resilient symmetric cryptography under empirically verifiable assumptions
- Leakage-resilient symmetric encryption via re-keying
- Practical leakage-resilient pseudorandom objects with minimum public randomness
- Practical leakage-resilient symmetric cryptography
- Rogue Decryption Failures: Reconciling AE Robustness Notions
- Simulatable leakage: analysis, pitfalls, and new constructions
- Sponges resist leakage: the case of authenticated encryption
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Theory of Cryptography
- Towards sound approaches to counteract power-analysis attacks
Cited in
(14)- Sponges resist leakage: the case of authenticated encryption
- A modular approach to the incompressibility of block-cipher-based AEADs
- Non-malleable codes from leakage resilient cryptographic primitives
- Reducing the cost of authenticity with leakages: a CIML2-secure AE scheme with one call to a strongly protected tweakable block cipher
- On Provable Security of wPRF-Based Leakage-Resilient Stream Ciphers
- Sponge-based authenticated encryption: security against quantum attackers
- Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
- \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption
- Efficient leakage-resilient MACs without idealized assumptions
- Authenticated encryption based on Lesamnta-LW hashing mode
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- Authenticated encryption in the face of protocol and side channel leakage
- Strongly leakage resilient authenticated key exchange, revisited
- Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
This page was built for publication: Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2106709)