We investigate constructing message authentication schemes from symmetric cryptographic primitives, with the goal of achieving security when most intermediate values during tag computation and verification are leaked (i.e., mode-level leakage-resilience). Existing efficient proposals typically follow the plain Hash-then-MAC paradigm T = TGenK(H(M)). When the domain of the MAC function TGenK is {0, 1}128, e.g., when instantiated with the AES, forgery is possible within time 264 and data complexity 1. To dismiss such cheap attacks, we propose two modes: LRW1-based Hash-then-MAC (LRWHM) that is built upon the LRW1 tweakable blockcipher of Liskov, Rivest, and Wagner, and Rekeying Hash-then-MAC (RHM) that employs internal rekeying. Built upon se...
In this talk, I will discuss how recent advances in side-channel analysis and leakage-resilience cou...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
Abstract. Message Authentication Code construction Alred and its AES-based instance Alpha-MAC were i...
We investigate constructing message authentication schemes from symmetric cryptographic primitives, ...
Leakage-resilient cryptography tries to design algorithms that are provably secure against side-chan...
One of the goals of modern cryptography is to prevent an adversary from making forgeries. That is, s...
Leakage-resilient cryptography tries to design algorithms that are provably secure against side-chan...
Leakage-resilient cryptography tries to design algorithms that are provably secure against side-chan...
Securing cryptographic systems in the presence of side-channel leakages is still an important proble...
Securing cryptographic systems in the presence of side-channel leakages is still an important proble...
Abstract In cryptography, secure channels enable the confidential and authenticated message exchange...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
In cryptology, secure channels enable the exchange of messages in a confidential andauthenticated ma...
Abstract. We consider the security of message authentication code (MAC) algorithms, and the construc...
In cryptology, secure channels enable the exchange of messages in a confidential andauthenticated ma...
In this talk, I will discuss how recent advances in side-channel analysis and leakage-resilience cou...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
Abstract. Message Authentication Code construction Alred and its AES-based instance Alpha-MAC were i...
We investigate constructing message authentication schemes from symmetric cryptographic primitives, ...
Leakage-resilient cryptography tries to design algorithms that are provably secure against side-chan...
One of the goals of modern cryptography is to prevent an adversary from making forgeries. That is, s...
Leakage-resilient cryptography tries to design algorithms that are provably secure against side-chan...
Leakage-resilient cryptography tries to design algorithms that are provably secure against side-chan...
Securing cryptographic systems in the presence of side-channel leakages is still an important proble...
Securing cryptographic systems in the presence of side-channel leakages is still an important proble...
Abstract In cryptography, secure channels enable the confidential and authenticated message exchange...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
In cryptology, secure channels enable the exchange of messages in a confidential andauthenticated ma...
Abstract. We consider the security of message authentication code (MAC) algorithms, and the construc...
In cryptology, secure channels enable the exchange of messages in a confidential andauthenticated ma...
In this talk, I will discuss how recent advances in side-channel analysis and leakage-resilience cou...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
Abstract. Message Authentication Code construction Alred and its AES-based instance Alpha-MAC were i...