2020
DOI: 10.1007/978-3-030-64837-4_21
|View full text |Cite
|
Sign up to set email alerts
|

Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 73 publications
0
7
0
Order By: Relevance
“…These attacks, known as side-channel attacks (SCAs), are especially harmful when chips containing private data are in an adversary's hands or installed in locations where the general public can access them. Smart cards, sensor network nodes, and IoT devices are vulnerable [14], [15]. SCAs can be avoided using several strategies, such as masking [15][16][17] and hiding [18] [27,28,29,30].…”
Section: A Backgroundmentioning
confidence: 99%
See 3 more Smart Citations
“…These attacks, known as side-channel attacks (SCAs), are especially harmful when chips containing private data are in an adversary's hands or installed in locations where the general public can access them. Smart cards, sensor network nodes, and IoT devices are vulnerable [14], [15]. SCAs can be avoided using several strategies, such as masking [15][16][17] and hiding [18] [27,28,29,30].…”
Section: A Backgroundmentioning
confidence: 99%
“…Smart cards, sensor network nodes, and IoT devices are vulnerable [14], [15]. SCAs can be avoided using several strategies, such as masking [15][16][17] and hiding [18] [27,28,29,30]. However, rekeying [15,19,20], which uses the target cipher plus a subkey generation algorithm that accepts the master key as input, is a less expensive method of obtaining resistance against side-channel attacks.…”
Section: A Backgroundmentioning
confidence: 99%
See 2 more Smart Citations
“…Apart from analyzing an AE scheme under security models mentioned in previous sections, attacks exist where the adversary does take advantage of weaknesses in the cryptographic algorithms but takes advantage of sideline information from its implementation instead. Such attacks, known as Side-Channel Attacks(SCA), are particularly dangerous when chips with sensitive information are in the hands of an adversary or are deployed where they are accessible to the general public, like IoT devices, sensor network nodes, and smarts cards [77], [78]. AE schemes use several techniques to prevent side-channel attacks include hiding [79] and masking [78,80,81] and re-keying [78,82,83], in which we do not use the target cipher only but also a session generation function that uses the master key as input on top of it.…”
Section: Protection Against Side-channel Attacksmentioning
confidence: 99%