Leakage-Resilient Symmetric Cryptography

نویسنده

  • François-Xavier Standaert
چکیده

. In Moni Naor, editor, Theory of Cryptography, First Theory of Cryp-tography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004,Proceedings, volume 2951 of Lecture Notes in Computer Science, pages 278–296.Springer, 2004.55. Andrew Moss, Elisabeth Oswald, Dan Page, and Michael Tunstall. Compiler assisted masking. In Prouff and Schaumont [66], pages 58–75.56. Moni Naor and Gil Segev. Public-key cryptosystems resilient to key leakage. In Shai Halevi, editor, Advances in Cryptology CRYPTO 2009, 29th Annual InternationalCryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings,volume 5677 of Lecture Notes in Computer Science, pages 18–35. Springer, 2009.57. Phong Q. Nguyen and Elisabeth Oswald, editors. EUROCRYPT 2014 33rdAnnual International Conference on the Theory and Applications of CryptographicTechniques, Copenhagen, Denmark, May 11-15, 2014, volume 8441 of Lecture Notesin Computer Science. Springer, 2014.58. Svetla Nikova, Vincent Rijmen, and Martin Schläffer. Secure hardware implementa-tion of nonlinear functions in the presence of glitches. J. Cryptology, 24(2):292–321,2011.59. Elisabeth Oswald and Marc Fischlin, editors. EUROCRYPT 2015 34th AnnualInternational Conference on the Theory and Applications of Cryptographic Tech-niques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I, volume 9056 ofLecture Notes in Computer Science. Springer, 2015.60. Olivier Pereira, François-Xavier Standaert, and Srinivas Vivek. Leakage-resilientauthentication and encryption from symmetric cryptographic primitives. In In-drajit Ray, Ninghui Li, and Christopher Kruegel, editors, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver,CO, USA, October 12-6, 2015, pages 96–108. ACM, 2015. 61. Peter Pessl, François-Xavier Standaert, Stefan Mangard, and François Durvaux.Towards leakage simulators that withstand the correlation distinguisher. ASI-ACRYPT 2014 rump session. 62. Christophe Petit, François-Xavier Standaert, Olivier Pereira, Tal Malkin, and MotiYung. A block cipher based pseudo random number generator secure against side-channel key recovery. In Masayuki Abe and Virgil D. Gligor, editors, Proceedingsof the 2008 ACM Symposium on Information, Computer and CommunicationsSecurity, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pages 56–65. ACM,2008. 63. Krzysztof Pietrzak. A leakage-resilient mode of operation. In Joux [42], pages462–482. 64. Gilles Piret, Thomas Roche, and Claude Carlet. PICARO A block cipher allowingefficient higher-order side-channel resistance. In Feng Bao, Pierangela Samarati,and Jianying Zhou, editors, Applied Cryptography and Network Security 10thInternational Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings,volume 7341 of Lecture Notes in Computer Science, pages 311–328. Springer, 2012. 65. Emmanuel Prouff and Matthieu Rivain. Masking against side-channel attacks: A formal security proof. In Johansson and Nguyen [40], pages 142–159. 66. Emmanuel Prouff and Patrick Schaumont, editors. Cryptographic Hardware and Embedded Systems CHES 2012 14th International Workshop, Leuven, Bel-gium, September 9-12, 2012, volume 7428 of Lecture Notes in Computer Science.Springer, 2012. 67. Matthieu Rivain and Emmanuel Prouff. Provably secure higher-order masking of AES. In Cryptographic Hardware and Embedded Systems, CHES 2010, 12th Inter-national Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings,pages 413–427, 2010. 68. Palash Sarkar and Tetsu Iwata, editors. ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security,Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Part I, volume 8873 of LectureNotes in Computer Science. Springer, 2014. 69. François-Xavier Standaert, Tal Malkin, and Moti Yung. A unified framework for the analysis of side-channel key recovery attacks. In Joux [42], pages 443–461. 70. François-Xavier Standaert, Olivier Pereira, and Yu Yu. Leakage-resilient symmetriccryptography under empirically verifiable assumptions. In Ran Canetti and Juan A.Garay, editors, Advances in Cryptology CRYPTO 2013 33rd Annual CryptologyConference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I,volume 8042 of Lecture Notes in Computer Science, pages 335–352. Springer, 2013. 71. François-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, MotiYung, and Elisabeth Oswald. Leakage resilient cryptography in practice. InAhmad-Reza Sadeghi and David Naccache, editors, Towards Hardware-IntrinsicSecurity Foundations and Practice, Information Security and Cryptography, pages 99–134. Springer, 2010. 72. Yosuke Todo, Gregor Leander, and Yu Sasaki. Nonlinear invariant attack prac-tical attack on full SCREAM, iSCREAM, and Midori64. In Jung Hee Cheon andTsuyoshi Takagi, editors, Advances in Cryptology ASIACRYPT 2016 22nd In-ternational Conference on the Theory and Application of Cryptology and Informa-tion Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, volume10032 of Lecture Notes in Computer Science, pages 3–33, 2016. 73. Nicolas Veyrat-Charvillon, Benôıt Gérard, and François-Xavier Standaert. Softanalytical side-channel attacks. In Sarkar and Iwata [68], pages 282–296.74. Nicolas Veyrat-Charvillon, Marcel Medwed, Stéphanie Kerckhof, and François-Xavier Standaert. Shuffling against side-channel attacks: A comprehensive studywith cautionary note. In Xiaoyun Wang and Kazue Sako, editors, ASIACRYPT2012 18th International Conference on the Theory and Application of Cryptol-ogy and Information Security, Beijing, China, December 2-6, 2012, volume 7658of Lecture Notes in Computer Science, pages 740–757. Springer, 2012.75. Yu Yu and François-Xavier Standaert. Practical leakage-resilient pseudorandomobjects with minimum public randomness. In Ed Dawson, editor, Topics in Cryp-tology CT-RSA 2013 The Cryptographers’ Track at the RSA Conference 2013,San Francisco,CA, USA, February 25-March 1, 2013. Proceedings, volume 7779 ofLecture Notes in Computer Science, pages 223–238. Springer, 2013.76. Yu Yu, François-Xavier Standaert, Olivier Pereira, and Moti Yung. Practi-cal leakage-resilient pseudorandom generators. In Ehab Al-Shaer, Angelos D.Keromytis, and Vitaly Shmatikov, editors, Proceedings of the 17th ACM Con-ference on Computer and Communications Security, CCS 2010, Chicago, Illinois,USA, October 4-8, 2010, pages 141–151. ACM, 2010.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practical Leakage-Resilient Symmetric Cryptography

Leakage resilient cryptography attempts to incorporate sidechannel leakage into the black-box security model and designs cryptographic schemes that are provably secure within it. Informally, a scheme is leakage-resilient if it remains secure even if an adversary learns a bounded amount of arbitrary information about the schemes internal state. Unfortunately, most leakage resilient schemes are u...

متن کامل

Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness

One of the main challenges in leakage-resilient cryptography is to obtain proofs of security against side-channel attacks, under realistic assumptions and for efficient constructions. In a recent work from CHES 2012, Faust et al. proposed new designs of stream ciphers and pseudorandom functions for this purpose. Yet, a remaining limitation of these constructions is that they require large amoun...

متن کامل

Leakage-Resilient Symmetric Encryption via Re-keying

In the paper, we study whether it is possible to construct an efficient leakage-resilient symmetric scheme using the AES block cipher. We aim at bridging the gap between the theoretical leakage-resilient symmetric primitives used to build encryption schemes and the practical schemes that do not have any security proof against side-channel adversaries. Our goal is to construct an as efficient as...

متن کامل

Leakage-Resilient Tweakable Encryption from One-Way Functions

In this paper, we initiate the study of leakage-resilient tweakable encryption schemes in the relative key-leakage model, where the adversary can obtain (arbitrary) partial information about the secret key. We also focus on the minimal and generic assumptions needed to construct such a primitive. Interestingly, we show provably secure constructions of leakage-resilient (LR) tweakable encryption...

متن کامل

A new security proof for FMNV continuous non-malleable encoding scheme

A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting memories against tampering attacks. Many different types of non-malleability have alre...

متن کامل

Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions

Leakage-resilient cryptography aims at formally proving the security of cryptographic implementations against large classes of sidechannel adversaries. One important challenge for such an approach to be relevant is to adequately connect the formal models used in the proofs with the practice of side-channel attacks. It raises the fundamental problem of finding reasonable restrictions of the leak...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016