Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
From MaRDI portal
Publication:2106709
DOI10.1007/978-3-030-68773-1_15zbMATH Open1504.94163OpenAlexW3013384204MaRDI QIDQ2106709FDOQ2106709
Authors: Juliane Krämer, Patrick Struck
Publication date: 16 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-68773-1_15
Recommendations
- Sponges resist leakage: the case of authenticated encryption
- Authenticated encryption in the face of protocol and side channel leakage
- Practical leakage-resilient symmetric cryptography
- Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks
- A Leakage-Resilient Mode of Operation
Cites Work
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Theory of Cryptography
- Title not available (Why is that?)
- Leakage-resilient symmetric cryptography under empirically verifiable assumptions
- Practical leakage-resilient symmetric cryptography
- Towards sound approaches to counteract power-analysis attacks
- Authenticated encryption in the face of protocol and side channel leakage
- Practical leakage-resilient pseudorandom objects with minimum public randomness
- Simulatable leakage: analysis, pitfalls, and new constructions
- Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
- Boosting authenticated encryption robustness with minimal modifications
- Leakage-resilient symmetric encryption via re-keying
- Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks
- Rogue Decryption Failures: Reconciling AE Robustness Notions
- Leakage resilience of the duplex construction
- Sponges resist leakage: the case of authenticated encryption
- Authenticated encryption with nonce misuse and physical leakage: definitions, separation results and first construction (extended abstract)
Cited In (14)
- Non-malleable codes from leakage resilient cryptographic primitives
- Reducing the cost of authenticity with leakages: a CIML2-secure AE scheme with one call to a strongly protected tweakable block cipher
- On Provable Security of wPRF-Based Leakage-Resilient Stream Ciphers
- Sponge-based authenticated encryption: security against quantum attackers
- Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
- \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption
- Efficient leakage-resilient MACs without idealized assumptions
- Authenticated encryption based on Lesamnta-LW hashing mode
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- Authenticated encryption in the face of protocol and side channel leakage
- Strongly leakage resilient authenticated key exchange, revisited
- Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
- Sponges resist leakage: the case of authenticated encryption
- A modular approach to the incompressibility of block-cipher-based AEADs
This page was built for publication: Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2106709)