Towards sound fresh re-keying with hard (physical) learning problems
From MaRDI portal
Publication:2829218
DOI10.1007/978-3-662-53008-5_10zbMATH Open1391.94746OpenAlexW2484680112WikidataQ58764961 ScholiaQ58764961MaRDI QIDQ2829218FDOQ2829218
Authors: Stefan Dziembowski, Sebastian Faust, Gottfried Herold, Anthony Journault, Daniel Masny, François-Xavier Standaert
Publication date: 27 October 2016
Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53008-5_10
Recommendations
- Leakage-resilient symmetric encryption via re-keying
- A new birthday-type algorithm for attacking the fresh re-keying countermeasure
- Public-key cryptosystems resilient to key leakage
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- Practical leakage-resilient symmetric cryptography
Cites Work
- On lattices, learning with errors, random linear codes, and cryptography
- On solving LPN using BKW and variants, Implementation and analysis
- New Algorithms for Learning in Presence of Errors
- Title not available (Why is that?)
- Lapin: an efficient authentication protocol based on ring-LPN
- Noise-tolerant learning, the parity problem, and the statistical query model
- On the Existence of Pseudorandom Generators
- Advances in Cryptology - CRYPTO 2003
- Title not available (Why is that?)
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Power Analysis Attacks
- Towards sound approaches to counteract power-analysis attacks
- Tweakable block ciphers
- Pseudorandom functions and lattices
- Topics in Cryptology – CT-RSA 2005
- How to certify the leakage of a chip?
- Practical leakage-resilient pseudorandom objects with minimum public randomness
- On the concrete hardness of learning with errors
- Leakage resilient ElGamal encryption
- An improved BKW algorithm for LWE with applications to cryptography and lattices
- Pushing the limits: a very compact and a threshold implementation of AES
- Leakage-resilient symmetric encryption via re-keying
- Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks
- Towards super-exponential side-channel security with efficient leakage-resilient PRFs
- Masking against Side-Channel Attacks: A Formal Security Proof
- A more efficient AES threshold implementation
- Unifying leakage models: from probing attacks to noisy leakage.
- Masking and leakage-resilient primitives: one, the other(s) or both?
- Learning with rounding, revisited. New reduction, properties and applications
- Key homomorphic PRFs and their applications
- Hardness of SIS and LWE with small parameters
- Making Masking Security Proofs Concrete
- Lossy codes and a new variant of the learning-with-errors problem
- Improved side-channel analysis of finite-field multiplication
- Side-Channel Analysis of Multiplications in GF(2128)
- Higher-Order Threshold Implementations
- Fresh re-keying: security against side-channel and fault attacks for low-cost devices
- Conversion of security proofs from one leakage model to another: a new issue
- Hardware implementation and side-channel analysis of Lapin
- Generic Side-Channel Countermeasures for Reconfigurable Devices
- Circuit Compilers with $$O(1/\log (n))$$ O ( 1 / log ( n ) ) Leakage Rate
- On the Hardness of Learning with Rounding over Small Modulus
- SPRING: Fast Pseudorandom Functions from Rounded Ring Products
- A Leakage Resilient MAC
- FPGA implementations of SPRING and their countermeasures against side-channel attacks
Cited In (6)
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- Learning with physical rounding for linear and quadratic leakage functions
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption
- Leakage-resilient symmetric encryption via re-keying
- Practical significance of security bounds for standardized internally re-keyed block cipher modes
This page was built for publication: Towards sound fresh re-keying with hard (physical) learning problems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2829218)