1 |
Marcel Medwed, Christophe Petit, Francesco Regazzoni, Mathieu Renauld, and Francois-Xavier Standaert, "Fresh re-keying II: Securing multiple parties against side-channel and fault attacks", in Emmanuel Prouff, editor, CARDIS 2011, Vol. 7079 of LNCS, pp. 115-132. Springer, 2011.
|
2 |
G. Bertoni, J. Daemen, M. Peeters, and G. Van Assche, "Sponge functions", in Ecrypt Hash Workshop 2007, May 2007, also available as public comment to NIST from http://www.csrc.nist.gov/pki/HashWorkshop/Public_Comments/2007_May.html.
|
3 |
Thomas Unterluggauer, Mario Werner, and Stefan Mangard., "Side-channel plaintext-recovery attacks on leakage-resilient encryption.", in DATE, 2017.
|
4 |
V. Grosso, G. Leurent, F.-X. Standaert, K. Varici, F. D. A. Journault, L. Gaspar, and S. Kerckhof, "SCREAM & iSCREAM Side-Channel Resistant Authenticated Encryption with Masking;", in CAESAR Competition, 2014.
|
5 |
Dobraunig, C., Eichlseder, M., Mangard, S., Mendel, F., Unterluggauer, T, "ISAP- towards side-channel secure authenticated encryption.", IACR Trans. Symmetric Cryptol. 2017(1), 80-105, 2017.
|
6 |
Paul C. Kocher, Joshua Jaffe, and Benjamin Jun, Differential Power Analysis, In Michael J. Wiener, editor, CRYPTO '99, Vol. 1666 of LNCS, pp. 388-397. Springer, 1999.
|
7 |
Paul Kocher, Leak Resistant Cryptographic Indexed Key Update, US Patent 6539092, 2003.
|
8 |
Bart Mennink, Reza Reyhanitabar, and Damian Vizar "Security of full-state keyed sponge and duplex: Applications to authenticated encryption," iIn Tetsu Iwata and Jung Hee Cheon, editors, ASIACRYPT 2015, Vol. 9453 of LNCS, pp. 465-489. Springer, 2015.
|
9 |
Marcel Medwed, François-Xavier Standaert, Johann GroBschadl, and Francesco Regazzoni, "Fresh re-keying: Security against side-channel and fault attacks for low-cost devices," in Daniel J. Bernstein and Tanja Lange, editors, AFRICACRYPT 2010, volume 6055 of LNCS, pages 279-296. Springer, 2010.
|
10 |
Chang-hoon Lee, "A Study on Application Method of Crypto-module for Industrial Control System", in Content Applications and Convergence Technology, Journal of DCS, Vol. 18, No. 5, August. 2017.
|
11 |
Francesco Berti, Francois Koeune, Olivier Pereira, Thomas Peters, and Francois-Xavier Standaert, "Leakage-resilient and misuse-resistant authenticated encryption", Cryptology ePrint Archive, Report 2016/996, 2016.
|
12 |
Elena Andreeva, Joan Daemen, Bart Mennink, and Gilles Van Assche, "Security of keyed sponge constructions using a modular proof approach", In Gregor Leander, editor, FSE 2015, Vol. 9054 of LNCS, pp. 364-384. Springer, 2015.
|
13 |
Abdalla, M., Bellare, M., "Increasing the lifetime of a key: A comparative analysis of the security of re-keying techniques", In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.1976, pp. 546-559. Springer 2000.
|
14 |
Hee-Sook Kim, "Smart CCTV Security Service in IoT(Internet of Things) Environment", in Convergence Content Services, Journal of DCS, Vol. 18, No. 6, October. 2017.
|
15 |
Sonia Belaid, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jorn-Marc Schmidt, Francois-Xavier Standaert, and Stefan Tillich, "Towards fresh re-keying with leakage-resilient PRFs: Cipher design principles and analysis.", J. Cryptographic Engineering, 4(3):157-171, 2014.
|
16 |
Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche, "On the indifferentiability of the sponge construction", in Nigel P. Smart, editor, EUROCRYPT 2008, volume 4965 of LNCS, pages 181-197. Springer, 2008.
|
17 |
Christoph Dobraunig, Francois Koeune, Stefan Mangard, Florian Mendel, and Francois-Xavier Standaert, "Towards fresh and hybrid re-keying schemes with beyond birthday security", In Naofumi Homma and Marcel Medwed, editors, CARDIS 2015, Vol. 9514 of LNCS, pp. 225-241. Springer, 2015.
|
18 |
Sebastian Faust, Krzysztof Pietrzak, and Joachim Schipper, "Practical leakage resilient symmetric cryptography", in Emmanuel Prouff and Patrick Schaumont, editors, CHES 2012, volume 7428 of LNCS, pages 213-232. Springer, 2012.
|
19 |
Stefan Mangard, Elisabeth Oswald, and Thomas Popp, "Power analysis attacks - Revealing the secrets of smart cards", Springer, 2007.
|
20 |
Qian Guo and Thomas Johansson, "A new birthday-type algorithm for attacking the fresh re-keying countermeasure", Cryptology ePrint Archive, Report 2016/225, 2016.
|