User menu

Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis

Bibliographic reference Belaïd, Sonia ; De Santis, Frabrizio ; Heyszl, Johann ; Mangard, Stefan ; Medwed, Marcel ; et. al. Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis. In: Journal of Cryptographic Engineering, Vol. 4, no.3, p. 157-171 (2014)
Permanent URL
  1. Archambeau, C., Peeters, E., Standaert, F.X., Quisquater, J.J.: Template attacks in principal subspaces. In: Goubin, L., Matsui, M. (eds.) CHES, LNCS, pp. 1–14. Springer, Berlin (2006)
  2. Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: Present: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES, LNCS, pp. 450–466. Springer, Berlin (2007)
  3. Bogdanov, A., Knudsen, L.R., Leander, G., Standaert, F.X., Steinberger, J.P., Tischhauser, E.: Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT, LNCS, pp. 45–62. Springer, Berlin (2012)
  4. Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.J. (eds.) CHES, LNCS, pp. 16–29. Springer, Berlin (2004)
  5. Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener, M.J. (ed.) CRYPTO, LNCS, pp. 398–412. Springer, Berlin (1999)
  6. Dodis, Y., Pietrzak, K.: Leakage-resilient pseudorandom functions and side-channel attacks on feistel networks. In: Rabin, T. (ed.) CRYPTO, LNCS, pp. 21–40. Springer, Berlin (2010)
  7. Dziembowski, S., Pietrzak, K.: Leakage-resilient cryptography. FOCS, pp. 293–302. IEEE Computer Society, USA (2008)
  8. Elaabid M. Abdelaziz, Guilley Sylvain, Portability of templates, 10.1007/s13389-012-0030-6
  9. Faraday Technology Corporation: Faraday FSA0A\_C 0.18 $$\mu $$ μ m ASIC Standard Cell Library (2004).
  10. Faust, S., Pietrzak, K., Schipper, J.: Practical leakage-resilient symmetric cryptography. In: Prouff, E, Schaumont, P (eds.) pp. 213–232
  11. Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES, LNCS, pp. 251–261. Springer, Berlin (2001)
  12. Goubin, L., Patarin, J.: Des and differential power analysis (the “duplication” method). In: Koç, Ç.K., Paar, C. (eds.) CHES, LNCS, pp. 158–172. Springer, Berlin (1999)
  13. Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.J.B.: The led block cipher. In: Preneel, B., Takagi, T. (eds.) CHES, LNCS, pp. 326–341. Springer, Berlin (2011)
  14. Heyszl, J., Mangard, S., Heinz, B., Stumpf, F., Sigl, G.: Localized electromagnetic analysis of cryptographic implementations. In: Dunkelman, O. (ed.) CT-RSA, LNCS, pp. 231–244. Springer, Berlin (2012)
  15. Heyszl, J., Merli, D., Heinz, B., De Santis, F., Sigl, G.: Strengths and limitations of high-resolution electromagnetic field measurements for side-channel analysis. In: Mangard, S. (ed.) CARDIS LNCS. Springer, Berlin (2012)
  16. Joux, A. (ed.): Advances in Cryptology—EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26–30, 2009. In: Proceedings of the LNCS, vol. 5479. Springer, Berlin (2009).
  17. Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.): Cryptographic Hardware and Embedded Systems—CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13–15, 2002, Revised Papers, LNCS, vol. 2523. Springer, Berlin (2003).
  18. Kocher, P.C.: Leak resistant cryptographic indexed key update. US Patent
  19. Leander, G.: Small scale variants of the block cipher present. Cryptology ePrint Archive, Report 2010/143 (2010)
  20. MacMahon, P.A.: Percy Alexander MacMahon: Collected Papers—vol. 1: Combinatorics. MIT Press, USA (1978)
  21. Mangard, S.: Hardware countermeasures against dpa—a statistical analysis of their effectiveness. CT-RSA, LNCS, pp. 222–235. Springer, Berlin (2004)
  22. Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks—Revealing the Secrets of Smart Cards. Springer, Berlin (2007)
  23. Mangard, S., Oswald, E., Standaert, F.X.: One for all—all for one: unifying standard differential power analysis attacks. IET Inform. Secur. 5(2), 100–110 (2011).
  24. Mangard, S., Popp, T., Gammel, B.M.: Side-channel leakage of masked CMOS gates. In: Menezes, A. (ed.) CT-RSA, LNCS, pp. 351–365. Springer, Berlin (2005)
  25. Medwed, M., Petit, C., Regazzoni, F., Renauld, M., Standaert, F.X.: Fresh re-keying ii: securing multiple parties against side-channel and fault attacks. In: Prouff, E. (ed.) CARDIS, LNCS, pp. 115–132. Springer, Berlin (2011)
  26. Medwed, M., Standaert, F.X., Großschädl, J., Regazzoni, F.: Fresh re-keying: security against side-channel and fault attacks for low-cost devices. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT, LNCS, pp. 279–296. Springer, Berlin (2010)
  27. Medwed, M., Standaert, F.X., Joux, A.: Towards super-exponential side-channel security with efficient leakage-resilient prfs. In: Prouff, E., Schaumont, P. (eds.) pp. 193–212
  28. Pietrzak, K.: A leakage-resilient mode of operation. In: Joux, A. (ed.) pp. 462–482
  29. Poucheret, F., Barthe, L., Benoit, P., Torres, L., Maurine, P., Robert, M.: Spatial EM jamming: a countermeasure against EM analysis? In: VLSI-SoC, pp. 105–110. IEEE, New York (2010)
  30. Prouff, E., Schaumont, P. (eds.): Cryptographic Hardware and Embedded Systems—CHES 2012—14th International Workshop, Leuven, Belgium, September 9–12, 2012. In: Proceedings of the LNCS, vol. 7428. Springer, Berlin (2012).
  31. Quisquater, J.J., Samyde, D.: Electromagnetic analysis (EMA): measures and counter-measures for smart cards. In: Attali, I., Jensen, T.P. (eds.) E-smart, LNCS, pp. 200–210. Springer, Berlin (2001)
  32. Renauld, M., Standaert, F.X., Veyrat-Charvillon, N., Kamel, D., Flandre, D.: A formal study of power variability issues and side-channel attacks for nanoscale devices. In: Paterson, K.G. (ed.) EUROCRYPT, LNCS, pp. 109–128. Springer, Berlin (2011)
  33. Rivain, M., Prouff, E.: Provably secure higher-order masking of AES. In: Mangard, S., Standaert, F.X. (eds.) CHES, LNCS, pp. 413–427. Springer, Berlin (2010)
  34. Sauvage Laurent, Guilley Sylvain, Mathieu Yves, Electromagnetic Radiations of FPGAs : High Spatial Resolution Cartography and Attack on a Cryptographic Module, 10.1145/1502781.1502785
  35. Schramm, K., Wollinger, T.J., Paar, C.: A new class of collision attacks and its application to DES. In: FSE, pp. 206–222 (2003)
  36. Standaert, F.X., Archambeau, C.: Using subspace-based template attacks to compare and combine power and electromagnetic information leakages. In: Oswald, E., Rohatgi, P. (eds.) CHES, LNCS, pp. 411–425. Springer, Berlin (2008)
  37. Standaert, F.X., Malkin, T., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A (ed.) pp. 443–461
  38. Standaert François-Xavier, Pereira Olivier, Yu Yu, Quisquater Jean-Jacques, Yung Moti, Oswald Elisabeth, Leakage Resilient Cryptography in Practice, Information Security and Cryptography (2010) ISBN:9783642144516 p.99-134, 10.1007/978-3-642-14452-3_5
  39. Standaert, F.X., Veyrat-Charvillon, N., Oswald, E., Gierlichs, B., Medwed, M., Kasper, M., Mangard, S.: The world is not enough: another look on second-order dpa. In: Abe, M. (ed.) ASIACRYPT, LNCS, pp. 112–129. Springer, Berlin (2010)
  40. Veyrat-Charvillon, N., Gerard, B., Renauld, M., Standaert, F.X.: An optimal key enumeration algorithm and its application to side-channel attacks. Cryptology ePrint Archive, Report 2011/610 (2011)
  41. Veyrat-Charvillon Nicolas, Gérard Benoît, Standaert François-Xavier, Security Evaluations beyond Computing Power, Advances in Cryptology – EUROCRYPT 2013 (2013) ISBN:9783642383472 p.126-141, 10.1007/978-3-642-38348-9_8
  42. Yu, Y., Standaert, F.X.: Practical leakage-resilient pseudorandom objects with minimum public randomness. In: Dawson, E. (ed.) CT-RSA, LNCS, pp. 223–238. Springer, Berlin (2013)
  43. Yu, Y., Standaert, F.X., Pereira, O., Yung, M.: Practical leakage-resilient pseudorandom generators. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM CCS, pp. 141–151. ACM, USA (2010)