Sponges resist leakage: the case of authenticated encryption
From MaRDI portal
Publication:2176648
DOI10.1007/978-3-030-34621-8_8zbMATH Open1456.94071OpenAlexW2991227433MaRDI QIDQ2176648FDOQ2176648
Authors: Jean Paul Degabriele, Christian Janson, Patrick Struck
Publication date: 5 May 2020
Full work available at URL: http://tubiblio.ulb.tu-darmstadt.de/116160/
Recommendations
- Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
- Sponge-based authenticated encryption: security against quantum attackers
- Authenticated encryption in the face of protocol and side channel leakage
- How to incorporate associated data in sponge-based authenticated encryption
- Beyond conventional security in sponge-based authenticated encryption modes
Cited In (19)
- Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation
- Lightweight authenticated encryption mode suitable for threshold implementation
- Sponge-based authenticated encryption: security against quantum attackers
- Sp-AELM: sponge based authenticated encryption scheme for memory constrained devices
- \textsf{ISAP+}: \textsf{ISAP} with fast authentication
- \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption
- How to incorporate associated data in sponge-based authenticated encryption
- On the security of triplex- and multiplex-type constructions with smaller tweaks
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- Security of Keyed Sponge Constructions Using a Modular Proof Approach
- Lightweight leakage-resilient PRNG from TBCs using superposition
- Efficient leakage-resilient MACs without idealized assumptions
- On the related-key attack security of authenticated encryption schemes
- Secure two-party computation in a quantum world
- \textsf{LR-OT}: leakage-resilient oblivious transfer
- Authenticated encryption in the face of protocol and side channel leakage
- No-leak authentication by the Sherlock Holmes method
- Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
- A modular approach to the incompressibility of block-cipher-based AEADs
This page was built for publication: Sponges resist leakage: the case of authenticated encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2176648)