PRIMATEs v2.0
Autor: | Andreeva, Elena, Bilgin, Begül, Bogdanov, Andrey, Luykx, Atul, Mendel, Florian, Mennink, Bart, Mouha, Nicky, Wang, Qingju, Yasuda, Kan |
---|---|
Přispěvatelé: | Computer Security and Industrial Cryptography [KU Leuven] (ESAT-COSIC), Department of Electrical Engineering [KU Leuven] (KU-ESAT), Catholic University of Leuven - Katholieke Universiteit Leuven (KU Leuven)-Catholic University of Leuven - Katholieke Universiteit Leuven (KU Leuven), Faculty of Electrical Engineering, Mathematics and Computer Science [Twente] (EEMCS), University of Twente [Netherlands], Department of Applied Mathematics and Computer Science [Lyngby] (DTU Compute), Technical University of Denmark [Lyngby] (DTU), Institute of Applied Information Processing and Communications [Graz] (IAIK), Graz University of Technology [Graz] (TU Graz), Security, Cryptology and Transmissions (SECRET), Inria Paris-Rocquencourt, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Department of Computer Science, Shanghai Jiao Tong University [Shanghai], NTT Secure Platform Laboratories [Tokyo], Nippon Telegraph & Telephone Corporation - NTT, ANR-14-CE28-0015,BRUTUS,Chiffrements authentifiés et résistants aux attaques par canaux auxiliaires(2014) |
Jazyk: | angličtina |
Rok vydání: | 2015 |
Předmět: | |
Zdroj: | DIAC 2015-Directions in Authenticated Ciphers DIAC 2015-Directions in Authenticated Ciphers, Sep 2015, Singapore, Singapore |
Popis: | International audience; PRIMATEs are a family of permutation-based authenticated encryption algorithms for lightweight applications. They are currently under submission to the CAESAR competition. There are three PRIMATEs: the basic SpongeWrap-variant HANUMAN, GIBBON for speed-critical applications, and APE for additional security when nonces are reused or unverified plaintext is released. When resistance against hardware side-channel attacks is required, the PRIMATEs permutation has been designed to offer an efficient threshold implementation to counter first-order DPA attacks, based on glitch-free secret-sharing-based masking. |
Databáze: | OpenAIRE |
Externí odkaz: |