Filters








7 Hits in 3.9 sec

ISAP – Towards Side-Channel Secure Authenticated Encryption

Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer
2017 IACR Transactions on Symmetric Cryptology  
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations.  ...  In settings of pre-shared secret keys, such schemes render DPA attacks infeasible by deriving session keys and by ensuring that the attacker cannot collect side-channel leakage on the session key during  ...  Acknowledgments The authors would like to thank Mario Werner for many helpful discussions and providing his hardware description of Keccak.  ... 
doi:10.13154/tosc.v2017.i1.80-105 dblp:journals/tosc/DobraunigEMMU17 fatcat:i3piy7voorcrzmnkfe57fuftzu

Isap -- Towards Side-Channel Secure Authenticated Encryption

Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer
2017 Zenodo  
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations.  ...  In settings of pre-shared secret keys, such schemes render DPA attacks infeasible by deriving session keys and by ensuring that the attacker cannot collect side-channel leakage on the session key during  ...  Acknowledgments The authors would like to thank Mario Werner for many helpful discussions and providing his hardware description of Keccak.  ... 
doi:10.5281/zenodo.571743 fatcat:jp6cfqekozgutprlkzrkjltu7e

ISAP – Towards Side-Channel Secure Authenticated Encryption

Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer
2017 IACR Transactions on Symmetric Cryptology  
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations.  ...  In settings of pre-shared secret keys, such schemes render DPA attacks infeasible by deriving session keys and by ensuring that the attacker cannot collect side-channel leakage on the session key during  ...  Acknowledgments The authors would like to thank Mario Werner for many helpful discussions and providing his hardware description of Keccak.  ... 
doi:10.46586/tosc.v2017.i1.80-105 fatcat:ca3nkrhot5e7pc2l6amxztafje

Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers

William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, Kris Gaj
2018 Cryptography  
We show that FPGA implementations of the CAESAR Round 3 candidates ACORN, Ascon, CLOC (with AES and TWINE primitives), SILC (with AES, PRESENT, and LED primitives), JAMBU (with AES and SIMON primitives  ...  We then use threshold implementations to protect the above cipher implementations against 1st order DPA, and verify the effectiveness of countermeasures using the TVLA methodology.  ...  Figure 15 . 15 Results of t-tests on AES-GCM, ACORN, Ascon, SILC, JAMBU (SIMON), and Ketje Jr. authenticated cipher implementations, protected against 1st order DPA.  ... 
doi:10.3390/cryptography2030026 fatcat:nh7odxpdiza67om7dmf7k25e5y

Fault Injection as an Oscilloscope: Fault Correlation Analysis

Albert Spruyt, Alyssa Milburn, Łukasz Chmielewski
2020 Transactions on Cryptographic Hardware and Embedded Systems  
Such attacks have recently focused more on exploitation of implementation-centric and device-specific properties of the faults.  ...  Subsequently, we show the generic nature of our attacks by performing DPA on AES after applying FI attacks to several different targets (with AVR, 32-bit ARM and RISC-V CPUs), using different software  ...  Łukasz Chmielewski is supported by the European Commission through the ERC Starting Grant 805031 (EPOQUE) of Peter Schwabe.  ... 
doi:10.46586/tches.v2021.i1.192-216 fatcat:mlspidbv4rba7j76jk234xdvsi

Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction

Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2020 IACR Transactions on Symmetric Cryptology  
and implementations.  ...  We also provides the first rigorous methodology for the leakage-resistance of sponge/duplex-based AEs based on a minimal non-invertibility assumption on leakages, which leads to various insights on designs  ...  Thomas Peters is a postdoctoral researcher and François-Xavier Standaert is a senior research associate of the Belgian Fund for Scientific Research (F.R.S.-FNRS).  ... 
doi:10.13154/tosc.v2020.i1.6-42 dblp:journals/tosc/GuoPPS20 fatcat:rqfvudal2re6znqzn7umrtdxnm

ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS AGAINST THEORETICAL AND IMPLEMENTATION ATTACKS [article]

SILVIA MELLA
2018
This thesis deals with theoretical and implementation analysis of cryptographic functions.  ...  Keccak-f is used in different cryptographic primitives: Keccak (which defines the NIST standard SHA-3), Ketje and Keyak (which are currently at the third round of the CAESAR competition) and the authenticated  ...  Hardware implementations A hardware implementation of the AES algorithm can be split into three main parts, with different logical functionality: the storage for the data, the function that updates the  ... 
doi:10.13130/mella-silvia_phd2018-02-27 fatcat:phzf464ql5gvrdmhmbjzglsk4e