Authenticated encryption in the face of protocol and side channel leakage
From MaRDI portal
Publication:2412889
DOI10.1007/978-3-319-70694-8_24zbMath1420.94038OpenAlexW2594806102MaRDI QIDQ2412889
Martijn Stam, Daniel P. Martin, Guy Barwell, Elisabeth Oswald
Publication date: 6 April 2018
Full work available at URL: https://eprint.iacr.org/2017/068
Related Items (10)
Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions ⋮ \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption ⋮ Secret can be public: low-memory AEAD mode for high-order masking ⋮ A modular approach to the incompressibility of block-cipher-based AEADs ⋮ Sponge-based authenticated encryption: security against quantum attackers ⋮ Instantiability of classical random-oracle-model encryption transforms ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle ⋮ Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions ⋮ Lightweight authenticated encryption mode suitable for threshold implementation
This page was built for publication: Authenticated encryption in the face of protocol and side channel leakage