2018
DOI: 10.1007/978-3-319-76953-0_22
|View full text |Cite
|
Sign up to set email alerts
|

High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(16 citation statements)
references
References 15 publications
0
14
2
Order By: Relevance
“…We found that the remaining security level after an attack on this 2-PRG stage is still 2 120 , or 120 bits. This is significantly higher than the results reported on the Xilinx Spartan 6 platform in [34] where the security level was only 2 48 and we attribute this difference to the smaller feature size (28 nm compared to 45 nm) and the different placement strategy. Note that these results were achieved with a standalone design and not the entire system.…”
Section: Leakage Resilient Authenticated Decryptioncontrasting
confidence: 66%
See 4 more Smart Citations
“…We found that the remaining security level after an attack on this 2-PRG stage is still 2 120 , or 120 bits. This is significantly higher than the results reported on the Xilinx Spartan 6 platform in [34] where the security level was only 2 48 and we attribute this difference to the smaller feature size (28 nm compared to 45 nm) and the different placement strategy. Note that these results were achieved with a standalone design and not the entire system.…”
Section: Leakage Resilient Authenticated Decryptioncontrasting
confidence: 66%
“…It aims to bound the leakage per execution such that an attacker cannot accumulate information about the processed secret. We use the LR-PRF proposed by Unterstein et al [34] to derive a secret pseudorandom state from public initialization vectors (IVs). Specifically, that means processing two public IVs, IV of b and IV дmac , with the LR-PRF to get two secret IVs, denoted byÎ V of b andÎ V дmac , for the subsequent stream cipher and MAC.…”
Section: Protecting Confidentiality and Integrity Of Hw Ipmentioning
confidence: 99%
See 3 more Smart Citations