PRIMATEs v2.0

Autor: Andreeva, Elena, Bilgin, Begül, Bogdanov, Andrey, Luykx, Atul, Mendel, Florian, Mennink, Bart, Mouha, Nicky, Wang, Qingju, Yasuda, Kan
Přispěvatelé: Computer Security and Industrial Cryptography [KU Leuven] (ESAT-COSIC), Department of Electrical Engineering [KU Leuven] (KU-ESAT), Catholic University of Leuven - Katholieke Universiteit Leuven (KU Leuven)-Catholic University of Leuven - Katholieke Universiteit Leuven (KU Leuven), Faculty of Electrical Engineering, Mathematics and Computer Science [Twente] (EEMCS), University of Twente [Netherlands], Department of Applied Mathematics and Computer Science [Lyngby] (DTU Compute), Technical University of Denmark [Lyngby] (DTU), Institute of Applied Information Processing and Communications [Graz] (IAIK), Graz University of Technology [Graz] (TU Graz), Security, Cryptology and Transmissions (SECRET), Inria Paris-Rocquencourt, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Department of Computer Science, Shanghai Jiao Tong University [Shanghai], NTT Secure Platform Laboratories [Tokyo], Nippon Telegraph & Telephone Corporation - NTT, ANR-14-CE28-0015,BRUTUS,Chiffrements authentifiés et résistants aux attaques par canaux auxiliaires(2014)
Jazyk: angličtina
Rok vydání: 2015
Předmět:
Zdroj: DIAC 2015-Directions in Authenticated Ciphers
DIAC 2015-Directions in Authenticated Ciphers, Sep 2015, Singapore, Singapore
Popis: International audience; PRIMATEs are a family of permutation-based authenticated encryption algorithms for lightweight applications. They are currently under submission to the CAESAR competition. There are three PRIMATEs: the basic SpongeWrap-variant HANUMAN, GIBBON for speed-critical applications, and APE for additional security when nonces are reused or unverified plaintext is released. When resistance against hardware side-channel attacks is required, the PRIMATEs permutation has been designed to offer an efficient threshold implementation to counter first-order DPA attacks, based on glitch-free secret-sharing-based masking.
Databáze: OpenAIRE