Zobrazeno 1 - 10
of 93
pro vyhledávání: '"Bart Mennink"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
We employ an algebraic approach to estimate the success rate of a sidechannel adversary attacking secrets of a masked circuit within the Random Probing Model (RPM), where intermediate variables of the implementation leak with a probability p. Our met
Externí odkaz:
https://doaj.org/article/daafc1e872ba4a0abd107a0a10197eef
Autor:
Henk Berendsen, Bart Mennink
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 1 (2024)
Lightweight cryptographic constructions are often optimized on multiple aspects that put the security bounds to the limit. In this respect, it is important to obtain security bounds that are tight and give an accurate and exact indication of the gene
Externí odkaz:
https://doaj.org/article/c0d6b2ff2f64404a95958b22e865562b
Autor:
Charlotte Lefevre, Bart Mennink
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 1 (2024)
It is known that the sponge construction is tightly indifferentiable from a random oracle up to around 2c/2 queries, where c is the capacity. In particular, it cannot provide generic security better than half of the underlying permutation size. In th
Externí odkaz:
https://doaj.org/article/ffcaa6b9c15042bea99167345dabd48a
Autor:
Bart Mennink
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 2 (2023)
At SAC 2011, Bertoni et al. introduced the keyed duplex construction as a tool to build permutation based authenticated encryption schemes. The construction was generalized to full-state absorption by Mennink et al. (ASIACRYPT 2015). Daemen et al. (A
Externí odkaz:
https://doaj.org/article/2b1d0c67e7f046948721c2d750a92f5d
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 2 (2023)
Universal hash functions play a prominent role in the design of message authentication codes and the like. Whereas it is known how to build highly efficient sequential universal hash functions, parallel non-algebraic universal hash function designs a
Externí odkaz:
https://doaj.org/article/0400550f17104f1fa2403972fe31a35d
Autor:
Christina Boura, Bart Mennink
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 1 (2023)
Externí odkaz:
https://doaj.org/article/feccf95be12d450bb88b0ff5946c4b25
Autor:
Itai Dinur, Bart Mennink
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 1 (2022)
Externí odkaz:
https://doaj.org/article/b1a4959a38d947e6acf01653bb591c6e
Autor:
Christoph Dobraunig, Bart Mennink
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 4 (2020)
Generic attacks are a vital ingredient in the evaluation of the tightness of security proofs. In this paper, we evaluate the tightness of the suffix keyed sponge (SuKS) bound. As its name suggests, SuKS is a sponge-based construction that absorbs the
Externí odkaz:
https://doaj.org/article/3920267f8ce549a9975228cf80d5c31d
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 3 (2020)
In ToSC 2018(4), Daemen et al. performed an in-depth investigation of sound hashing modes based on arbitrary functions, permutations, or block ciphers. However, for the case of invertible primitives, there is a glitch. In this errata, we formally fix
Externí odkaz:
https://doaj.org/article/cb72c330ba1740f486362c326d9b96cc
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
With the trend to connect more and more devices to the Internet, authenticated encryption has become a major backbone in securing the communication, not only between these devices and servers, but also the direct communication among these devices. Mo
Externí odkaz:
https://doaj.org/article/f119005102604e94b6371426df41f51e