In white-box cryptography, early protection techniques have fallen to the automated Differential Computation Analysis attack (DCA), leading to new countermeasures and attacks. A standard side-channel countermeasure, Ishai-Sahai-Wagner’s masking scheme (ISW, CRYPTO 2003) prevents Differential Computation Analysis but was shown to be vulnerable in the white-box context to the Linear Decoding Analysis attack (LDA). However, recent quadratic and cubic masking schemes by Biryukov-Udovenko (ASIACRYPT 2018) and Seker-Eisenbarth-Liskiewicz (CHES 2021) prevent LDA and force to use its higher-degree generalizations with much higher complexity.In this work, we study the relationship between the security of these and related schemes to the Learning Par...
White-box implementations aim to prevent the key extraction of the cryptographic algorithm even if t...
The (decisional) learning with errors problem (LWE) asks to distinguish "noisy" inner prod...
Post-quantum cryptography for resisting possible attacks from malicious quantum adversaries has beco...
At CHES 2016, Bos et al. introduced differential computational analysis (DCA) as an attack on white-...
Learning parity with physical noise (LPPN) has been proposed as an assumption on which to build auth...
On white-box implementations, it has been proven that differential computation analysis (DCA) can re...
The Learning Parity with Noise (LPN) problem has recently found many applications in cryptography as...
The Learning Parity with Noise (LPN) problem has recently found many applications in cryptography as...
On white-box implementations, it has been proven that differential computation analysis (DCA) can re...
peer reviewedIn traditional symmetric cryptography, the adversary has access only to the inputs and ...
In traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a ...
peer reviewedIn traditional symmetric cryptography, the adversary has access only to the inputs and ...
Abstract. The Learning Parity with Noise problem (LPN) is appealing in cryptography as it is conside...
Power analysis has shown to be successful in breaking symmetric cryptographic algorithms implemented...
Power analysis has shown to be successful in breaking symmetric cryptographic algorithms implemented...
White-box implementations aim to prevent the key extraction of the cryptographic algorithm even if t...
The (decisional) learning with errors problem (LWE) asks to distinguish "noisy" inner prod...
Post-quantum cryptography for resisting possible attacks from malicious quantum adversaries has beco...
At CHES 2016, Bos et al. introduced differential computational analysis (DCA) as an attack on white-...
Learning parity with physical noise (LPPN) has been proposed as an assumption on which to build auth...
On white-box implementations, it has been proven that differential computation analysis (DCA) can re...
The Learning Parity with Noise (LPN) problem has recently found many applications in cryptography as...
The Learning Parity with Noise (LPN) problem has recently found many applications in cryptography as...
On white-box implementations, it has been proven that differential computation analysis (DCA) can re...
peer reviewedIn traditional symmetric cryptography, the adversary has access only to the inputs and ...
In traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a ...
peer reviewedIn traditional symmetric cryptography, the adversary has access only to the inputs and ...
Abstract. The Learning Parity with Noise problem (LPN) is appealing in cryptography as it is conside...
Power analysis has shown to be successful in breaking symmetric cryptographic algorithms implemented...
Power analysis has shown to be successful in breaking symmetric cryptographic algorithms implemented...
White-box implementations aim to prevent the key extraction of the cryptographic algorithm even if t...
The (decisional) learning with errors problem (LWE) asks to distinguish "noisy" inner prod...
Post-quantum cryptography for resisting possible attacks from malicious quantum adversaries has beco...