User menu

Accès à distance ? S'identifier sur le proxy UCLouvain

Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF

  • Open access
  • PDF
  • 2.71 M
  1. Abdalla Michel, Belaïd Sonia, Fouque Pierre-Alain, Leakage-Resilient Symmetric Encryption via Re-keying, Cryptographic Hardware and Embedded Systems - CHES 2013 (2013) ISBN:9783642403484 p.471-488, 10.1007/978-3-642-40349-1_27
  2. Balasch Josep, Gierlichs Benedikt, Grosso Vincent, Reparaz Oscar, Standaert François-Xavier, On the Cost of Lazy Engineering for Masked Software Implementations, Smart Card Research and Advanced Applications (2015) ISBN:9783319167626 p.64-81, 10.1007/978-3-319-16763-3_5
  3. Belaïd Sonia, Grosso Vincent, Standaert François-Xavier, Masking and leakage-resilient primitives: One, the other(s) or both?, 10.1007/s12095-014-0113-6
  4. Belaïd, S., De Santis, F., Heyszl, J., Mangard, S., Medwed, M., Schmidt, J.-M., Standaert, F.-X., Tillich, S.: Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis. J. Cryptographic Eng. 4(3), 157–171 (2014)
  5. Bilgin Begül, Gierlichs Benedikt, Nikova Svetla, Nikov Ventzislav, Rijmen Vincent, Higher-Order Threshold Implementations, Lecture Notes in Computer Science (2014) ISBN:9783662456071 p.326-343, 10.1007/978-3-662-45608-8_18
  6. Bilgin Begül, Gierlichs Benedikt, Nikova Svetla, Nikov Ventzislav, Rijmen Vincent, A More Efficient AES Threshold Implementation, Progress in Cryptology – AFRICACRYPT 2014 (2014) ISBN:9783319067339 p.267-284, 10.1007/978-3-319-06734-6_17
  7. Chari Suresh, Jutla Charanjit S., Rao Josyula R., Rohatgi Pankaj, Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology — CRYPTO’ 99 (1999) ISBN:9783540663478 p.398-412, 10.1007/3-540-48405-1_26
  8. Coron Jean-Sébastien, Giraud Christophe, Prouff Emmanuel, Renner Soline, Rivain Matthieu, Vadnala Praveen Kumar, Conversion of Security Proofs from One Leakage Model to Another: A New Issue, Constructive Side-Channel Analysis and Secure Design (2012) ISBN:9783642299117 p.69-81, 10.1007/978-3-642-29912-4_6
  9. Dodis Yevgeniy, Pietrzak Krzysztof, Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks, Advances in Cryptology – CRYPTO 2010 (2010) ISBN:9783642146220 p.21-40, 10.1007/978-3-642-14623-7_2
  10. Duc, A., Faust, S., Standaert, F.-X.: Making masking security proofs concrete or how to evaluate the security of any leaking device (extended version). Cryptology ePrint Archive, Report 2015/119 (2015). http://eprint.iacr.org/
  11. Faust Sebastian, Pietrzak Krzysztof, Schipper Joachim, Practical Leakage-Resilient Symmetric Cryptography, Cryptographic Hardware and Embedded Systems – CHES 2012 (2012) ISBN:9783642330261 p.213-232, 10.1007/978-3-642-33027-8_13
  12. Fumaroli Guillaume, Martinelli Ange, Prouff Emmanuel, Rivain Matthieu, Affine Masking against Higher-Order Side Channel Analysis, Selected Areas in Cryptography (2011) ISBN:9783642195730 p.262-280, 10.1007/978-3-642-19574-7_18
  13. Goldreich Oded, Goldwasser Shafi, Micali Silvio, How to construct random functions, 10.1145/6490.6503
  14. Grosso, V., Poussier, R., Standaert, F.-X., Gaspar, L.: Combining leakage-resilient prfs and shuffling - towards bounded security for small embedded devices. In: Joye and Moradi [16], pp. 122–136
  15. Ishai Yuval, Sahai Amit, Wagner David, Private Circuits: Securing Hardware against Probing Attacks, Advances in Cryptology - CRYPTO 2003 (2003) ISBN:9783540406747 p.463-481, 10.1007/978-3-540-45146-4_27
  16. Joye, M., Moradi, A. (eds.): CARDIS 2014. LNCS, vol. 8968. Springer, Heidelberg (2015)
  17. Mangard Stefan, Popp Thomas, Gammel Berndt M., Side-Channel Leakage of Masked CMOS Gates, Lecture Notes in Computer Science (2005) ISBN:9783540243991 p.351-365, 10.1007/978-3-540-30574-3_24
  18. Mangard Stefan, Pramstaller Norbert, Oswald Elisabeth, Successfully Attacking Masked AES Hardware Implementations, Cryptographic Hardware and Embedded Systems – CHES 2005 (2005) ISBN:9783540284741 p.157-171, 10.1007/11545262_12
  19. Mather Luke, Oswald Elisabeth, Whitnall Carolyn, Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer, Lecture Notes in Computer Science (2014) ISBN:9783662456101 p.243-261, 10.1007/978-3-662-45611-8_13
  20. Medwed Marcel, Standaert François-Xavier, Joux Antoine, Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs, Cryptographic Hardware and Embedded Systems – CHES 2012 (2012) ISBN:9783642330261 p.193-212, 10.1007/978-3-642-33027-8_12
  21. Micali Silvio, Reyzin Leonid, Physically Observable Cryptography, Theory of Cryptography (2004) ISBN:9783540210009 p.278-296, 10.1007/978-3-540-24638-1_16
  22. Moradi Amir, Poschmann Axel, Ling San, Paar Christof, Wang Huaxiong, Pushing the Limits: A Very Compact and a Threshold Implementation of AES, Advances in Cryptology – EUROCRYPT 2011 (2011) ISBN:9783642204647 p.69-88, 10.1007/978-3-642-20465-4_6
  23. Nikova Svetla, Rijmen Vincent, Schläffer Martin, Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches, 10.1007/s00145-010-9085-7
  24. Pereira Olivier, Standaert François-Xavier, Vivek Srinivas, Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives, 10.1145/2810103.2813626
  25. Prouff, E., Schaumont, P. (eds.): CHES 2012. LNCS, vol. 7428. Springer, Heidelberg (2012)
  26. Rivain Matthieu, Prouff Emmanuel, Provably Secure Higher-Order Masking of AES, Cryptographic Hardware and Embedded Systems, CHES 2010 (2010) ISBN:9783642150302 p.413-427, 10.1007/978-3-642-15031-9_28
  27. Standaert François-Xavier, Pereira Olivier, Yu Yu, Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions, Advances in Cryptology – CRYPTO 2013 (2013) ISBN:9783642400407 p.335-352, 10.1007/978-3-642-40041-4_19
  28. Standaert François-Xavier, Pereira Olivier, Yu Yu, Quisquater Jean-Jacques, Yung Moti, Oswald Elisabeth, Leakage Resilient Cryptography in Practice, Information Security and Cryptography (2010) ISBN:9783642144516 p.99-134, 10.1007/978-3-642-14452-3_5
  29. Standaert François-Xavier, Veyrat-Charvillon Nicolas, Oswald Elisabeth, Gierlichs Benedikt, Medwed Marcel, Kasper Markus, Mangard Stefan, The World Is Not Enough: Another Look on Second-Order DPA, Advances in Cryptology - ASIACRYPT 2010 (2010) ISBN:9783642173721 p.112-129, 10.1007/978-3-642-17373-8_7
  30. Veyrat-Charvillon Nicolas, Gérard Benoît, Renauld Mathieu, Standaert François-Xavier, An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks, Selected Areas in Cryptography (2013) ISBN:9783642359989 p.390-406, 10.1007/978-3-642-35999-6_25
  31. Veyrat-Charvillon Nicolas, Medwed Marcel, Kerckhof Stéphanie, Standaert François-Xavier, Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note, Advances in Cryptology – ASIACRYPT 2012 (2012) ISBN:9783642349607 p.740-757, 10.1007/978-3-642-34961-4_44
  32. Yu Yu, Standaert François-Xavier, Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness, Topics in Cryptology – CT-RSA 2013 (2013) ISBN:9783642360947 p.223-238, 10.1007/978-3-642-36095-4_15
Bibliographic reference Medwed, Marcel ; Standaert, François-Xavier ; Feldhofer, Martin ; Nikov, Ventzislav. Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF.22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2016) (Hanoi (Vietnam), du 04/12/2016 au 08/12/2016). In: Jung Hee Cheon, Tsuyoshi Takagi, Proceedings of the 22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2016), Springer2016, p. 602-623
Permanent URL http://hdl.handle.net/2078.1/181924