2019
DOI: 10.1007/978-3-030-23696-0_12
|View full text |Cite
|
Sign up to set email alerts
|

Reducing the Cost of Authenticity with Leakages: a $$\mathsf {CIML2}$$-Secure $$\mathsf {AE}$$ Scheme with One Call to a Strongly Protected Tweakable Block Cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 28 publications
0
1
0
Order By: Relevance
“…Another approach to design an AE scheme with SCA resistance is leakage-resilient cryptography. The schemes [ 9 – 11 , 23 , 24 ] based on the Pereira et al.’s approach [ 39 ] assume a leak-free component, and are optimized for minimizing the number of calls to it 3 . However, the way how to realize the leak-free component, that determines the implementation size, is usually out of scope.…”
Section: Introductionmentioning
confidence: 99%
“…Another approach to design an AE scheme with SCA resistance is leakage-resilient cryptography. The schemes [ 9 – 11 , 23 , 24 ] based on the Pereira et al.’s approach [ 39 ] assume a leak-free component, and are optimized for minimizing the number of calls to it 3 . However, the way how to realize the leak-free component, that determines the implementation size, is usually out of scope.…”
Section: Introductionmentioning
confidence: 99%