10 Hits in 9.1 sec

Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction

Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2020 IACR Transactions on Symmetric Cryptology  
We also provides the first rigorous methodology for the leakage-resistance of sponge/duplex-based AEs based on a minimal non-invertibility assumption on leakages, which leads to various insights on designs  ...  The ongoing NIST lightweight cryptography standardization process highlights the importance of resistance to side-channel attacks, which has renewed the interest for Authenticated Encryption schemes (AEs  ...  Acknowledgments We thank the reviewers for comments that help reshape our work, and Itamar Levi for discussion w.r.t. side-channel state recovery attack against duplex.  ... 
doi:10.13154/tosc.v2020.i1.6-42 dblp:journals/tosc/GuoPPS20 fatcat:rqfvudal2re6znqzn7umrtdxnm

Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge [article]

Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2019 IACR Cryptology ePrint Archive  
Our analysis offers the first rigorous methodology for the analysis of the leakage-resistance of sponge/duplexbased AEs.  ...  We conclude that TETSponge offers an appealing option for the implementation of low-energy AE in settings where side-channel attacks are an actual concern.  ...  We thank the reviewers of CRYPTO 2019 for comments that help reshape our work, and Itamar Levi for discussion w.r.t. side-channel state recovery attack against duplex.  ... 
dblp:journals/iacr/GuoPPS19 fatcat:tyh5rkjpnveybmk4sgft7awytq

Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle [article]

Davide Bellizia, Olivier Bronchain, Gaëtan Cassiers, Vincent Grosso, Chun Guo, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2020 IACR Cryptology ePrint Archive  
We finally initiate a comparative discussion of the different solutions to instantiate the components of a leakage-resistant authenticated encryption scheme.  ...  Triggered by the increasing deployment of embedded cryptographic devices (e.g., for the IoT), the design of authentication, encryption and authenticated encryption schemes enabling improved security against  ...  The estimated energy per byte encrypted on ASIC is shown in Figure 8 .  ... 
dblp:journals/iacr/BelliziaBCGGMPP20 fatcat:lzjczutcmvhtbidq6n2o6cszui

TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications

Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2019 Transactions on Cryptographic Hardware and Embedded Systems  
(iii) It can be implemented with a remarkably low energy cost when strong resistance to side-channel attacks is needed, supports online encryption and handles static and incremental associated data efficiently  ...  TEDT provides the following features: (i) It offers full leakage-resistance, that is, it limits the exploitability of physical leakages via side-channel attacks, even if these leakages happen during every  ...  In general, the sponge duplex construction (without complementary ingredients) also provides some (weaker) security guarantees (formally, CPA security and ciphertext integrity with leakage in encryption  ... 
doi:10.13154/tches.v2020.i1.256-320 dblp:journals/tches/BertiGPPS20 fatcat:kqbuclxmdjdcxn4ai4ihgsa7ce

Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives

Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang
2021 IACR Transactions on Symmetric Cryptology  
Moreover, we extend the reach of our model beyond plain encryption primitives and propose a novel energy-efficient message authentication code Trivium-LE-MAC.  ...  In the paper by Banik et al. (IACR ToSC 2018), stream ciphers were identified as ideal candidates for low-energy solutions.  ...  Acknowledgments Subhadeep Banik is supported by the Swiss National Science Foundation (SNSF) through the Ambizione Grant PZ00P2_179921.  ... 
doi:10.46586/tosc.v2021.i4.36-73 fatcat:36bjujr3yzb7dgrqoqg45hgc7u

Symmetric Cryptography (Dagstuhl Seminar 18021)

Joan Daemen, Tetsu Iwata, Nils Gregor Leander, Kaisa Nyberg, Michael Wagner
2018 Dagstuhl Reports  
This report documents the program and the outcomes of Dagstuhl Seminar 18021 "Symmetric  ...  We discussed how to instantiate the Whitened Swap-Or-Not Construction by S. Tessaro [1].  ...  We first discussed some inherent limitations and restrictions before showing a first attempt how the framework could be instantiated. Instantiating the Whitened Swap-Or-Not Construction  ... 
doi:10.4230/dagrep.8.1.1 dblp:journals/dagstuhl-reports/DaemenILN18 fatcat:qffcmfhvu5bappymycvy5pbxvy

Provably Secure Authenticated Encryption

Damian Vizár
Authenticated Encryption (AE) is a symmetric key cryptographic primitive that ensures confidentiality and authenticity of processed messages at the same time.  ...  Inspired by the modifications that gave rise to pure OMD, we turn to the popular Sponge-based AE schemes and prove that similar measures can also be applied to the keyed Sponge and keyed Duplex (a variant  ...  Encryption via the Sponge is typically done with the Duplex construction [BDPA11a]. Bertoni et al. showed that the Duplex allows for authenticated encryption in the form of SpongeWrap [BDPA11a].  ... 
doi:10.5075/epfl-thesis-8681 fatcat:lnmf4nr3xjdfzdf3l6x5dmzhia

Integrated Electronics to Control and Readout Electrochemical Biosensors for Implantable Applications

Seyedeh Sara Ghoreishizadeh
Recently, use of sponge-based hash functions for authenticated encryption of IMDs was introduced [143] .  ...  Figure 7 . 3 :Figure 7 . 4 : 7374 .3, where crop and pad functions are simple DUPLEXSPONGE construction for authenticated encryption, reprinted from [14] .  ... 
doi:10.5075/epfl-thesis-6600 fatcat:d46gfqbvmbdftlyras7ofjdtj4

Full Professor at Technische Hochschule Ingolstadt, Germany Seah Boon Keong, MIMOS Berhad, Malaysia Sylvia Kierkegaard, IAITL-International Association of IT Lawyers, Denmark Mthulisi Velempini

Masahito Hayashi, Vladimir Stantchev, Wolfgang Boehmer, Manuel Gil Pérez, Hans-Joachim Hof, Syed Naqvi, Steffen Wendzel, Fraunhofer Fkie, Germany Bonn, M Geir, Køien, Gerardo Adesso (+96 others)
2016 Switzerland International Journal on Advances in Security   unpublished
This paper, apart from the description of the solution itself, describes the surrounding software environment, including the key exchange, and illustrates the results of thorough test simulations with  ...  IPsec, on the other hand, is a well-known security protocol that uses classical encryption and is capable of exactly creating site-to-site virtual private networks.  ...  ACKNOWLEDGMENT The authors would like to thank members of ETSI SAGE for their expert advice. ACKNOWLEDGMENT The authors would like to thank Geir M.  ... 

The 6×6 stiffness formulation and transformation of serial manipulators via the CCT theory

Shih-Feng Chen
2003 IEEE International Conference on Robotics and Automation (Cat. No.03CH37422)  
Except in the case of chemical energy threats (e.g., shaped charges), a material with a low hardness will exhibit low ballistic performance no matter what its toughness.  ...  Automotive companies are increasing the composite content of their products to increase energy efficiency, dent resistance, and other performance.  ...  Metallic foams are a new class of materials with low densities, which could be made for example from aluminum, which can be used in automotive body structures [Reference 1].  ... 
doi:10.1109/robot.2003.1242218 dblp:conf/icra/Chen03 fatcat:zmssxoehbzamtoprst3o56vo5m