User menu

Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems

Bibliographic reference Dziembowski, Stefan ; Faust, Sebastian ; Herold, Gottfried ; Journault, Anthony ; Masny, Daniel ; et. al. Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems.Advances in Cryptology - 36th International Cryptology Conference (CRYPTO 2016) (Santa Barbara (USA), du 14/08/2016 au 18/08/2016). In: Matthew Robshaw, Jonathan Katz, Proceedings of CRYPTO 2016, Lecture Notes in Computer Science2016, p. 272-301
Permanent URL http://hdl.handle.net/2078.1/176515
  1. Abdalla Michel, Belaïd Sonia, Fouque Pierre-Alain, Leakage-Resilient Symmetric Encryption via Re-keying, Cryptographic Hardware and Embedded Systems - CHES 2013 (2013) ISBN:9783642403484 p.471-488, 10.1007/978-3-642-40349-1_27
  2. Albrecht Martin R., Player Rachel, Scott Sam, On the concrete hardness of Learning with Errors, 10.1515/jmc-2015-0016
  3. Alwen Joël, Krenn Stephan, Pietrzak Krzysztof, Wichs Daniel, Learning with Rounding, Revisited, Advances in Cryptology – CRYPTO 2013 (2013) ISBN:9783642400407 p.57-74, 10.1007/978-3-642-40041-4_4
  4. Andrychowicz, M., Dziembowski, S., Faust, S.: Circuit compilers with $$O(1= \text{log}(n))$$ leakage rate. In: EUROCRYPT (2016)
  5. Arora Sanjeev, Ge Rong, New Algorithms for Learning in Presence of Errors, Automata, Languages and Programming (2011) ISBN:9783642220050 p.403-415, 10.1007/978-3-642-22006-7_34
  6. Balasch Josep, Gierlichs Benedikt, Grosso Vincent, Reparaz Oscar, Standaert François-Xavier, On the Cost of Lazy Engineering for Masked Software Implementations, Smart Card Research and Advanced Applications (2015) ISBN:9783319167626 p.64-81, 10.1007/978-3-319-16763-3_5
  7. Banerjee Abhishek, Peikert Chris, Rosen Alon, Pseudorandom Functions and Lattices, Advances in Cryptology – EUROCRYPT 2012 (2012) ISBN:9783642290107 p.719-737, 10.1007/978-3-642-29011-4_42
  8. Banerjee Abhishek, Brenner Hai, Leurent Gaëtan, Peikert Chris, Rosen Alon, SPRING: Fast Pseudorandom Functions from Rounded Ring Products, Fast Software Encryption (2015) ISBN:9783662467053 p.38-57, 10.1007/978-3-662-46706-0_3
  9. Belaïd, S., Fouque, P., Gérard, B.: Side-channel analysis of multiplications in GF(2128) - application to AES-GCM. In: ASIACRYPT (2014)
  10. Belaïd Sonia, Grosso Vincent, Standaert François-Xavier, Masking and leakage-resilient primitives: One, the other(s) or both?, 10.1007/s12095-014-0113-6
  11. Belaïd Sonia, Coron Jean-Sébastien, Fouque Pierre-Alain, Gérard Benoît, Kammerer Jean-Gabriel, Prouff Emmanuel, Improved Side-Channel Analysis of Finite-Field Multiplication, Lecture Notes in Computer Science (2015) ISBN:9783662483237 p.395-415, 10.1007/978-3-662-48324-4_20
  12. Bilgin Begül, Gierlichs Benedikt, Nikova Svetla, Nikov Ventzislav, Rijmen Vincent, A More Efficient AES Threshold Implementation, Progress in Cryptology – AFRICACRYPT 2014 (2014) ISBN:9783319067339 p.267-284, 10.1007/978-3-319-06734-6_17
  13. Bilgin Begül, Gierlichs Benedikt, Nikova Svetla, Nikov Ventzislav, Rijmen Vincent, Higher-Order Threshold Implementations, Lecture Notes in Computer Science (2014) ISBN:9783662456071 p.326-343, 10.1007/978-3-662-45608-8_18
  14. Blum Avrim, Kalai Adam, Wasserman Hal, Noise-tolerant learning, the parity problem, and the statistical query model, 10.1145/335305.335355
  15. Blum Avrim, Furst Merrick, Kearns Michael, Lipton Richard J., Cryptographic Primitives Based on Hard Learning Problems, Advances in Cryptology — CRYPTO’ 93 ISBN:9783540577669 p.278-291, 10.1007/3-540-48329-2_24
  16. Bogdanov Andrej, Guo Siyao, Masny Daniel, Richelson Silas, Rosen Alon, On the Hardness of Learning with Rounding over Small Modulus, Theory of Cryptography (2016) ISBN:9783662490952 p.209-224, 10.1007/978-3-662-49096-9_9
  17. Bogos, S., Tramér, F., Vaudenay, S.: On solving LPN using BKW and variants. In: IACR Cryptology ePrint Archive (2015)
  18. Boneh Dan, Lewi Kevin, Montgomery Hart, Raghunathan Ananth, Key Homomorphic PRFs and Their Applications, Advances in Cryptology – CRYPTO 2013 (2013) ISBN:9783642400407 p.410-428, 10.1007/978-3-642-40041-4_23
  19. Brenner Hai, Gaspar Lubos, Leurent Gaëtan, Rosen Alon, Standaert François-Xavier, FPGA Implementations of SPRING, Lecture Notes in Computer Science (2014) ISBN:9783662447086 p.414-432, 10.1007/978-3-662-44709-3_23
  20. Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: CHES (2002)
  21. Chari Suresh, Jutla Charanjit S., Rao Josyula R., Rohatgi Pankaj, Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology — CRYPTO’ 99 (1999) ISBN:9783540663478 p.398-412, 10.1007/3-540-48405-1_26
  22. Coron Jean-Sébastien, Giraud Christophe, Prouff Emmanuel, Renner Soline, Rivain Matthieu, Vadnala Praveen Kumar, Conversion of Security Proofs from One Leakage Model to Another: A New Issue, Constructive Side-Channel Analysis and Secure Design (2012) ISBN:9783642299117 p.69-81, 10.1007/978-3-642-29912-4_6
  23. Dobraunig, C., Koeune, F., Mangard, S., Mendel, F., Standaert, F.: Towards fresh, hybrid re-keying schemes with beyond birthday security. In: CARDIS (2015)
  24. Dodis Yevgeniy, Pietrzak Krzysztof, Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks, Advances in Cryptology – CRYPTO 2010 (2010) ISBN:9783642146220 p.21-40, 10.1007/978-3-642-14623-7_2
  25. Döttling Nico, Müller-Quade Jörn, Lossy Codes and a New Variant of the Learning-With-Errors Problem, Advances in Cryptology – EUROCRYPT 2013 (2013) ISBN:9783642383472 p.18-34, 10.1007/978-3-642-38348-9_2
  26. Duc Alexandre, Dziembowski Stefan, Faust Sebastian, Unifying Leakage Models: From Probing Attacks to Noisy Leakage., Advances in Cryptology – EUROCRYPT 2014 (2014) ISBN:9783642552199 p.423-440, 10.1007/978-3-642-55220-5_24
  27. Duc Alexandre, Faust Sebastian, Standaert François-Xavier, Making Masking Security Proofs Concrete, Advances in Cryptology -- EUROCRYPT 2015 (2015) ISBN:9783662467992 p.401-429, 10.1007/978-3-662-46800-5_16
  28. Durvaux François, Standaert François-Xavier, Veyrat-Charvillon Nicolas, How to Certify the Leakage of a Chip?, Advances in Cryptology – EUROCRYPT 2014 (2014) ISBN:9783642552199 p.459-476, 10.1007/978-3-642-55220-5_26
  29. Dziembowski Stefan, Pietrzak Krzysztof, Leakage-Resilient Cryptography, 10.1109/focs.2008.56
  30. Gammel, B., Fischer, W., Mangard, S.: Generating a session key for authentication and secure data transfer. US Patent App. 14/074,279, November 2013
  31. Gaspar Lubos, Leurent Gaëtan, Standaert François-Xavier, Hardware Implementation and Side-Channel Analysis of Lapin, Topics in Cryptology – CT-RSA 2014 (2014) ISBN:9783319048512 p.206-226, 10.1007/978-3-319-04852-9_11
  32. Goldreich Oded, Krawczyk Hugo, Luby Michael, On the Existence of Pseudorandom Generators, 10.1137/0222069
  33. Grosso Vincent, Standaert François-Xavier, Faust Sebastian, Masking vs. multiparty computation: how large is the gap for AES?, 10.1007/s13389-014-0073-y
  34. Güneysu Tim, Moradi Amir, Generic Side-Channel Countermeasures for Reconfigurable Devices, Cryptographic Hardware and Embedded Systems – CHES 2011 (2011) ISBN:9783642239502 p.33-48, 10.1007/978-3-642-23951-9_3
  35. Guo, Q., Johansson, T.: A new birthday-type algorithm for attacking the fresh re-keying countermeasure. Cryptology ePrint Archive, Report 2016/225 (2016)
  36. Heyse Stefan, Kiltz Eike, Lyubashevsky Vadim, Paar Christof, Pietrzak Krzysztof, Lapin: An Efficient Authentication Protocol Based on Ring-LPN, Fast Software Encryption (2012) ISBN:9783642340468 p.346-365, 10.1007/978-3-642-34047-5_20
  37. Ishai Yuval, Sahai Amit, Wagner David, Private Circuits: Securing Hardware against Probing Attacks, Advances in Cryptology - CRYPTO 2003 (2003) ISBN:9783540406747 p.463-481, 10.1007/978-3-540-45146-4_27
  38. Kiltz Eike, Pietrzak Krzysztof, Leakage Resilient ElGamal Encryption, Advances in Cryptology - ASIACRYPT 2010 (2010) ISBN:9783642173721 p.595-612, 10.1007/978-3-642-17373-8_34
  39. Kirchner Paul, Fouque Pierre-Alain, An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices, Lecture Notes in Computer Science (2015) ISBN:9783662479889 p.43-62, 10.1007/978-3-662-47989-6_3
  40. Liskov Moses, Rivest Ronald L., Wagner David, Tweakable Block Ciphers, 10.1007/s00145-010-9073-y
  41. Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)
  42. Mangard Stefan, Popp Thomas, Gammel Berndt M., Side-Channel Leakage of Masked CMOS Gates, Lecture Notes in Computer Science (2005) ISBN:9783540243991 p.351-365, 10.1007/978-3-540-30574-3_24
  43. Mangard Stefan, Pramstaller Norbert, Oswald Elisabeth, Successfully Attacking Masked AES Hardware Implementations, Cryptographic Hardware and Embedded Systems – CHES 2005 (2005) ISBN:9783540284741 p.157-171, 10.1007/11545262_12
  44. Martin Daniel P., Oswald Elisabeth, Stam Martijn, Wójcik Marcin, A Leakage Resilient MAC, Cryptography and Coding (2015) ISBN:9783319272382 p.295-310, 10.1007/978-3-319-27239-9_18
  45. Medwed Marcel, Petit Christoph, Regazzoni Francesco, Renauld Mathieu, Standaert François-Xavier, Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks, Smart Card Research and Advanced Applications (2011) ISBN:9783642272561 p.115-132, 10.1007/978-3-642-27257-8_8
  46. Medwed, M., Standaert, F., Großschädl, J., Regazzoni, F.: Fresh rekeying: security against side-channel and fault attacks for low-cost devices. In: AFRICACRYPT (2010)
  47. Medwed Marcel, Standaert François-Xavier, Joux Antoine, Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs, Cryptographic Hardware and Embedded Systems – CHES 2012 (2012) ISBN:9783642330261 p.193-212, 10.1007/978-3-642-33027-8_12
  48. Micciancio Daniele, Peikert Chris, Hardness of SIS and LWE with Small Parameters, Advances in Cryptology – CRYPTO 2013 (2013) ISBN:9783642400407 p.21-39, 10.1007/978-3-642-40041-4_2
  49. Moradi, A., Poschmann, A., Ling, S., Paar, C., Wang, H.: Pushing the limits: a very compact and a threshold implementation of AES. In: EUROCRYPT (2011)
  50. Nikova Svetla, Rijmen Vincent, Schläffer Martin, Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches, 10.1007/s00145-010-9085-7
  51. Pereira Olivier, Standaert François-Xavier, Vivek Srinivas, Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives, 10.1145/2810103.2813626
  52. Petit Christophe, Standaert François-Xavier, Pereira Olivier, Malkin Tal G., Yung Moti, A block cipher based pseudo random number generator secure against side-channel key recovery, 10.1145/1368310.1368322
  53. Prouand, E., Rivain, M.: Masking against side-channel attacks: a formal security proof. In: EUROCRYPT (2013)
  54. Regev Oded, On lattices, learning with errors, random linear codes, and cryptography, 10.1145/1060590.1060603
  55. Roche Thomas, Prouff Emmanuel, Higher-order glitch free implementation of the AES using Secure Multi-Party Computation protocols : Extended version, 10.1007/s13389-012-0033-3
  56. Schindler, W., Lemke, K., Paar, C.: A stochastic model for dierential side channel cryptanalysis. In: CHES (2005)
  57. Standaert François-Xavier, Pereira Olivier, Yu Yu, Quisquater Jean-Jacques, Yung Moti, Oswald Elisabeth, Leakage Resilient Cryptography in Practice, Information Security and Cryptography (2010) ISBN:9783642144516 p.99-134, 10.1007/978-3-642-14452-3_5
  58. Yu Yu, Standaert François-Xavier, Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness, Topics in Cryptology – CT-RSA 2013 (2013) ISBN:9783642360947 p.223-238, 10.1007/978-3-642-36095-4_15