Skip to main content

Fresh Re-keying

  • Living reference work entry
  • First Online:
Encyclopedia of Cryptography, Security and Privacy
  • 11 Accesses

Abstract

Abstract Text

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  • Belaïd S, Fouque P, Gérard B (2014a) Side-channel analysis of multiplications in GF(2128) – application to AES-GCM. In: Sarkar P, Iwata T (eds) Advances in Cryptology – ASIACRYPT 2014 – 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, 7–11 Dec 2014, Proceedings, Part II. Lecture Notes in Computer Science, vol 8874. Springer, pp 306–325. https://doi.org/10.1007/978-3-662-45608-8_17

  • Belaïd S, Santis FD, Heyszl J, Mangard S, Medwed M, Schmidt J, Standaert F, Tillich S (2014b) Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis. J Cryptogr Eng 4(3):157–171. https://doi.org/10.1007/s13389-014-0079-5

    Google Scholar 

  • Belaïd S, Coron J, Fouque P, Gérard B, Kammerer J, Prouff E (2015) Improved side-channel analysis of finite-field multiplication. In: Güneysu T, Handschuh H (eds) Cryptographic hardware and embedded systems – CHES 2015 – 17th International Workshop, Saint-Malo, 13– 16 Sept 2015. Proceedings. Lecture Notes in Computer Science, vol 9293. Springer, pp 395–415. https://doi.org/10.1007/978-3-662-48324-4_20

  • Dobraunig C, Eichlseder M, Mangard S, Mendel F (2014) On the security of fresh re-keying to counteract side-channel and fault attacks. In: Joye M, Moradi A (eds) Smart card research and advanced applications – 13th International Conference, CARDIS 2014, Paris, 5–7 Nov 2014. Revised Selected Papers. Lecture Notes in Computer Science, vol 8968. Springer, pp 233–244. https://doi.org/10.1007/978-3-319-16763-3_14

  • Dobraunig C, Koeune F, Mangard S, Mendel F, Standaert F (2015) Towards fresh and hybrid re-keying schemes with beyond birthday security. In: Homma N, Medwed M (eds) Smart Card Research and Advanced Applications – 14th International Conference, CARDIS 2015, Bochum, 4–6 Nov 2015. Revised Selected Papers. Lecture Notes in Computer Science, vol 9514. Springer, pp 225–241. https://doi.org/10.1007/978-3-319-31271-2_14

  • Dobraunig C, Eichlseder M, Mangard S, Mendel F, Mennink B, Primas R, Unterluggauer T (2020) Isap v2.0. IACR Trans Symmet Cryptol 2020(S1):390–416. https://tosc.iacr.org/index.php/ToSC/article/view/8625

    Article  Google Scholar 

  • Duval S, Méaux P, Momin C, Standaert F (2021) Exploring crypto-physical dark matter and learning with physical rounding towards secure and efficient fresh re-keying. IACR Trans Cryptogr Hardw Embed Syst 2021(1):373–401. https://doi.org/10.46586/tches.v2021.i1.373-401

    Google Scholar 

  • Dziembowski S, Faust S, Herold G, Journault A, Masny D, Standaert F (2016) Towards sound fresh re-keying with hard (physical) learning problems. In: Robshaw M, Katz J (eds) Advances in Cryptology – CRYPTO 2016 – 36th Annual International Cryptology Conference, Santa Barbara, 14–18 Aug 2016. Proceedings, Part II. Lecture Notes in Computer Science, vol 9815. Springer, pp 272–301. https://doi.org/10.1007/978-3-662-53008-5_10

  • Guo Q, Johansson T (2019) A new birthday-type algorithm for attacking the fresh re-keying countermeasure. Inf Process Lett 146:30–34. https://doi.org/10.1016/j.ipl.2019.02.005

    Article  MathSciNet  MATH  Google Scholar 

  • Medwed M, Standaert F, Großschädl J, Regazzoni F (2010) Fresh re-keying: security against side-channel and fault attacks for low-cost devices. In: Bernstein DJ, Lange T (eds) Progress in cryptology – AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, 3–6 May 2010. Proceedings. Lecture Notes in Computer Science, vol 6055. Springer, pp 279–296. https://doi.org/10.1007/978-3-642-12678-9_17

  • Medwed M, Petit C, Regazzoni F, Renauld M, Standaert F (2011) Fresh re-keying II: securing multiple parties against side-channel and fault attacks. In: Prouff E (ed) Smart Card Research and Advanced Applications – 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, 14–16 Sept 2011. Revised Selected Papers. Lecture Notes in Computer Science, vol 7079. Springer, pp 115–132. https://doi.org/10.1007/978-3-642-27257-8_8

  • Mennink B (2020) Beyond birthday bound secure fresh rekeying: application to authenticated encryption. In: Moriai S, Wang H (eds) Advances in Cryptology – ASIACRYPT 2020 – 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, 7–11 Dec 2020, Proceedings, Part I. Lecture Notes in Computer Science, vol 12491. Springer, pp 630–661. https://doi.org/10.1007/978-3-030-64837-4_21

  • Pessl P, Mangard S (2016) Enhancing side-channel analysis of binary-field multiplication with bit reliability. In: Sako K (ed) Topics in cryptology – CT-RSA 2016 – The Cryptographers’ Track at the RSA Conference 2016, San Francisco, 29 Feb–4 Mar 2016. Proceedings. Lecture Notes in Computer Science, vol 9610. Springer, pp 255–270. https://doi.org/10.1007/978-3-319-29485-8_15

  • Pietrzak K (2009) A leakage-resilient mode of operation. In: Joux A (ed) Advances in Cryptology – EUROCRYPT 2009. Springer, Berlin/Heidelberg, pp 462–482

    Chapter  Google Scholar 

  • Unterluggauer T, Werner M, Mangard S (2017) Side-channel plaintext-recovery attacks on leakage-resilient encryption. In: Atienza D, Natale GD (eds) Design, Automation & Test in Europe Conference & Exhibition, DATE 2017, Lausanne, 27–31 Mar 2017. IEEE, pp 1318–1323. https://doi.org/10.23919/DATE.2017.7927197

  • Xi X, Aysu A, Orshansky M (2018) Fresh re-keying with strong PUFs: a new approach to side-channel security. In: 2018 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2018, Washington, DC, 30 Apr–4 May 2018. IEEE Computer Society, pp 118–125. https://doi.org/10.1109/HST.2018.8383899

  • Yu Y, Standaert FX, Pereira O, Yung M (2010) Practical leakage-resilient pseudorandom generators. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS’10. Association for Computing Machinery, New York, pp 141–151. https://doi.org/10.1145/1866307.1866324

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marcel Medwed .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2023 Springer Science+Business Media LLC

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Medwed, M. (2023). Fresh Re-keying. In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27739-9_1702-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27739-9_1702-1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27739-9

  • Online ISBN: 978-3-642-27739-9

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics