Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems
From MaRDI portal
Publication:2829218
DOI10.1007/978-3-662-53008-5_10zbMath1391.94746OpenAlexW2484680112WikidataQ58764961 ScholiaQ58764961MaRDI QIDQ2829218
Sebastian Faust, Stefan Dziembowski, Daniel Masny, Gottfried Herold, Anthony Journault, François-Xavier Standaert
Publication date: 27 October 2016
Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53008-5_10
Related Items (5)
\texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption ⋮ Learning with physical rounding for linear and quadratic leakage functions ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model ⋮ Practical significance of security bounds for standardized internally re-keyed block cipher modes
Cites Work
- Unnamed Item
- Unnamed Item
- On solving LPN using BKW and variants, Implementation and analysis
- Tweakable block ciphers
- Secure hardware implementation of nonlinear functions in the presence of glitches
- On the concrete hardness of learning with errors
- Masking and leakage-resilient primitives: one, the other(s) or both?
- Improved side-channel analysis of finite-field multiplication
- On the Hardness of Learning with Rounding over Small Modulus
- Hardness of SIS and LWE with Small Parameters
- Learning with Rounding, Revisited
- Key Homomorphic PRFs and Their Applications
- Leakage-Resilient Symmetric Encryption via Re-keying
- Pseudorandom Functions and Lattices
- Side-Channel Analysis of Multiplications in GF(2128)
- Higher-Order Threshold Implementations
- SPRING: Fast Pseudorandom Functions from Rounded Ring Products
- Making Masking Security Proofs Concrete
- Pushing the Limits: A Very Compact and a Threshold Implementation of AES
- New Algorithms for Learning in Presence of Errors
- Leakage Resilient ElGamal Encryption
- Generic Side-Channel Countermeasures for Reconfigurable Devices
- An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices
- A Leakage Resilient MAC
- Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
- On the Existence of Pseudorandom Generators
- Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
- Lapin: An Efficient Authentication Protocol Based on Ring-LPN
- Conversion of Security Proofs from One Leakage Model to Another: A New Issue
- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness
- Lossy Codes and a New Variant of the Learning-With-Errors Problem
- Masking against Side-Channel Attacks: A Formal Security Proof
- Towards sound approaches to counteract power-analysis attacks
- A More Efficient AES Threshold Implementation
- Power Analysis Attacks
- FPGA Implementations of SPRING
- Hardware Implementation and Side-Channel Analysis of Lapin
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
- How to Certify the Leakage of a Chip?
- Advances in Cryptology - CRYPTO 2003
- Topics in Cryptology – CT-RSA 2005
- Circuit Compilers with $$O(1/\log (n))$$ O ( 1 / log ( n ) ) Leakage Rate
- Noise-tolerant learning, the parity problem, and the statistical query model
- On lattices, learning with errors, random linear codes, and cryptography
This page was built for publication: Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems