Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security 2015
DOI: 10.1145/2810103.2813626
|View full text |Cite
|
Sign up to set email alerts
|

Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives

Abstract: Leakage-resilient cryptosystems aim to maintain security in situations where their implementation leaks physical information about their internal secrets. Because of their efficiency and usability on a wide range of platforms, solutions based on symmetric primitives (such as block ciphers) are particularly attractive in this context. So far, the literature has mostly focused on the design of leakage-resilient pseudorandom objects (e.g. PRGs, PRFs, PRPs). In this paper, we consider the complementary and practic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
41
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 58 publications
(41 citation statements)
references
References 39 publications
0
41
0
Order By: Relevance
“…1 to design DPA-secure schemes from unprotected primitives are the leakage-resilient encryption schemes in [46,53,56] and the leakage-resilient MAC in [45]. Block-cipher-based instantiations of these schemes have a data complexity of q = 2 in order to prohibit successful key recovery via DPA attacks.…”
Section: Frequent Re-keyingmentioning
confidence: 99%
See 3 more Smart Citations
“…1 to design DPA-secure schemes from unprotected primitives are the leakage-resilient encryption schemes in [46,53,56] and the leakage-resilient MAC in [45]. Block-cipher-based instantiations of these schemes have a data complexity of q = 2 in order to prohibit successful key recovery via DPA attacks.…”
Section: Frequent Re-keyingmentioning
confidence: 99%
“…Using existing proposals of leakage-resilient block encryption [56] and a leakage-resilient MAC [45], both E NC and AE can be easily obtained from unprotected cryptographic implementations of standard primitives like AES and SHA-2 and the generic composition encrypt-then-MAC [8]. However, for the encryption and authentication of RAM, more lightweight constructions for E NC and AE are desirable.…”
Section: Instantiationmentioning
confidence: 99%
See 2 more Smart Citations
“…In the bounded retrieval model, Bellare et al [7] proved the security of a symmetric encryption scheme that provides authenticated encryption in the leak free case, and indistinguishability when leakage is involved. Pereira et al [43] proposed what is, to our knowledge, the first and only leakage resilient encryption scheme in the simulatable leakage model. However, the construction requires a leak free component and in practice relies on the existence of efficient simulators of the leakage from (e.g.)…”
Section: Related Workmentioning
confidence: 99%