Cayrel, P.-L.
Gaborit, P.
ProufT, E.
In this paper we describe the first implementation on smart-card of the code-based authentication protocol proposed by Stern at Crypto'93 and we give a securization of the scheme against side channel attacks. On the whole, this provides a secure implementation of a very practical authentication (and possibly signature) scheme which is mostly attractive for light-weight cryptography.
- Fiat Amos, Shamir Adi, How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Advances in Cryptology — CRYPTO’ 86 ISBN:9783540180470 p.186-194, 10.1007/3-540-47721-7_12
- Gaborit Philippe, Girault Marc, Lightweight code-based identification and signature, 10.1109/isit.2007.4557225
- Goubin Louis, Patarin Jacques, DES and Differential Power Analysis The “Duplication” Method, Cryptographic Hardware and Embedded Systems (1999) ISBN:9783540666462 p.158-172, 10.1007/3-540-48059-5_15
- Lemke Kerstin, Schramm Kai, Paar Christof, DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction, Lecture Notes in Computer Science (2004) ISBN:9783540226666 p.205-219, 10.1007/978-3-540-28632-5_15
- Luby M, Rackoff C, Pseudo-random permutation generators and cryptographic composition, 10.1145/12130.12167
- Luby Michael, Rackoff Charles, How to Construct Pseudorandom Permutations from Pseudorandom Functions, 10.1137/0217022
- Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks – Revealing the Secrets of Smartcards. Springer, Heidelberg (2007)
- McEvoy Robert, Tunstall Michael, Murphy Colin C., Marnane William P., Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures, Information Security Applications (2007) ISBN:9783540775348 p.317-332, 10.1007/978-3-540-77535-5_23
- Oswald Elisabeth, Schramm Kai, An Efficient Masking Scheme for AES Software Implementations, Information Security Applications (2006) ISBN:9783540310129 p.292-305, 10.1007/11604938_23
- Patarin Jacques, How to Construct Pseudorandom and Super Pseudorandom Permutations from One Single Pseudorandom Function, Advances in Cryptology — EUROCRYPT’ 92 ISBN:9783540564133 p.256-266, 10.1007/3-540-47555-9_22
- Petit, C., Standaert, F.-X., Pereira, O., Malkin, T.G., Yung, M.: A Block Cipher based PRNG Secure Against Side-Channel Key Recovery, http://eprint.iacr.org/2007/356.pdf
- Pieprzyk Josef, How to Construct Pseudorandom Permutations from Single Pseudorandom Functions, Advances in Cryptology — EUROCRYPT ’90 (1991) ISBN:9783540535874 p.140-150, 10.1007/3-540-46877-3_12
- Preneel, B.: Hash functions - present state of art. ECRYPT Report (2005)
- Prouff Emmanuel, Rivain Matthieu, A Generic Method for Secure SBox Implementation, Information Security Applications (2007) ISBN:9783540775348 p.227-244, 10.1007/978-3-540-77535-5_17
- Stern Jacques, A new identification scheme based on syndrome decoding, Advances in Cryptology — CRYPTO’ 93 ISBN:9783540577669 p.13-21, 10.1007/3-540-48329-2_2
Bibliographic reference |
Cayrel, P.-L. ; Gaborit, P. ; ProufT, E.. Secure implementation of the stern authentication and signature schemes for low-resource devices.Smart Card Research and Advanced Applications. 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008 (London, UK, 8-11 September 2008). In: Grimaud, G.; Standaert, F.-X.;, Smart Card Research and Advanced Applications. 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, Springer-verlag2008, p. 191-205 |
Permanent URL |
http://hdl.handle.net/2078.1/67649 |