HANMRE - An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches
暂无分享,去创建一个
[1] Thomas Peters,et al. On Leakage-Resilient Authenticated Encryption with Decryption Leakages , 2017, IACR Trans. Symmetric Cryptol..
[2] Patrick Schaumont,et al. Side-channel countermeasure for SHA-3 at almost-zero area overhead , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[3] Martijn Stam,et al. Rogue Decryption Failures: Reconciling AE Robustness Notions , 2015, IMACC.
[4] Bart Mennink,et al. Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption , 2015, ASIACRYPT.
[5] Atul Luykx,et al. Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes , 2014, IACR Cryptol. ePrint Arch..
[6] Seokhie Hong,et al. RCB: leakage-resilient authenticated encryption via re-keying , 2016, The Journal of Supercomputing.
[7] Florian Mendel,et al. ISAP - Towards Side-Channel Secure Authenticated Encryption , 2017, IACR Trans. Symmetric Cryptol..
[8] Moti Yung,et al. Leakage Resilient Cryptography in Practice , 2010, Towards Hardware-Intrinsic Security.
[9] Stefan Dziembowski,et al. Leakage-Resilient Cryptography , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.
[10] Srinivas Vivek,et al. Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives , 2015, CCS.
[11] Bart Mennink,et al. Full-State Keyed Duplex with Built-In Multi-user Support , 2017, ASIACRYPT.
[12] Stefan Mangard,et al. Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis , 2014, Journal of Cryptographic Engineering.
[13] Guido Bertoni,et al. Duplexing the sponge: single-pass authenticated encryption and other applications , 2011, IACR Cryptol. ePrint Arch..
[14] Pierre-Alain Fouque,et al. Leakage-Resilient Symmetric Encryption via Re-keying , 2013, CHES.
[15] Elisabeth Oswald,et al. Authenticated Encryption in the Face of Protocol and Side Channel Leakage , 2017, ASIACRYPT.
[16] Chanathip Namprempre,et al. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2000, ASIACRYPT.
[17] Florian Mendel,et al. Isap v2.0 , 2020, IACR Trans. Symmetric Cryptol..