Abstract
Abstract Text
Similar content being viewed by others
References
Belaïd S, Fouque P, Gérard B (2014a) Side-channel analysis of multiplications in GF(2128) – application to AES-GCM. In: Sarkar P, Iwata T (eds) Advances in Cryptology – ASIACRYPT 2014 – 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, 7–11 Dec 2014, Proceedings, Part II. Lecture Notes in Computer Science, vol 8874. Springer, pp 306–325. https://doi.org/10.1007/978-3-662-45608-8_17
Belaïd S, Santis FD, Heyszl J, Mangard S, Medwed M, Schmidt J, Standaert F, Tillich S (2014b) Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis. J Cryptogr Eng 4(3):157–171. https://doi.org/10.1007/s13389-014-0079-5
Belaïd S, Coron J, Fouque P, Gérard B, Kammerer J, Prouff E (2015) Improved side-channel analysis of finite-field multiplication. In: Güneysu T, Handschuh H (eds) Cryptographic hardware and embedded systems – CHES 2015 – 17th International Workshop, Saint-Malo, 13– 16 Sept 2015. Proceedings. Lecture Notes in Computer Science, vol 9293. Springer, pp 395–415. https://doi.org/10.1007/978-3-662-48324-4_20
Dobraunig C, Eichlseder M, Mangard S, Mendel F (2014) On the security of fresh re-keying to counteract side-channel and fault attacks. In: Joye M, Moradi A (eds) Smart card research and advanced applications – 13th International Conference, CARDIS 2014, Paris, 5–7 Nov 2014. Revised Selected Papers. Lecture Notes in Computer Science, vol 8968. Springer, pp 233–244. https://doi.org/10.1007/978-3-319-16763-3_14
Dobraunig C, Koeune F, Mangard S, Mendel F, Standaert F (2015) Towards fresh and hybrid re-keying schemes with beyond birthday security. In: Homma N, Medwed M (eds) Smart Card Research and Advanced Applications – 14th International Conference, CARDIS 2015, Bochum, 4–6 Nov 2015. Revised Selected Papers. Lecture Notes in Computer Science, vol 9514. Springer, pp 225–241. https://doi.org/10.1007/978-3-319-31271-2_14
Dobraunig C, Eichlseder M, Mangard S, Mendel F, Mennink B, Primas R, Unterluggauer T (2020) Isap v2.0. IACR Trans Symmet Cryptol 2020(S1):390–416. https://tosc.iacr.org/index.php/ToSC/article/view/8625
Duval S, Méaux P, Momin C, Standaert F (2021) Exploring crypto-physical dark matter and learning with physical rounding towards secure and efficient fresh re-keying. IACR Trans Cryptogr Hardw Embed Syst 2021(1):373–401. https://doi.org/10.46586/tches.v2021.i1.373-401
Dziembowski S, Faust S, Herold G, Journault A, Masny D, Standaert F (2016) Towards sound fresh re-keying with hard (physical) learning problems. In: Robshaw M, Katz J (eds) Advances in Cryptology – CRYPTO 2016 – 36th Annual International Cryptology Conference, Santa Barbara, 14–18 Aug 2016. Proceedings, Part II. Lecture Notes in Computer Science, vol 9815. Springer, pp 272–301. https://doi.org/10.1007/978-3-662-53008-5_10
Guo Q, Johansson T (2019) A new birthday-type algorithm for attacking the fresh re-keying countermeasure. Inf Process Lett 146:30–34. https://doi.org/10.1016/j.ipl.2019.02.005
Medwed M, Standaert F, Großschädl J, Regazzoni F (2010) Fresh re-keying: security against side-channel and fault attacks for low-cost devices. In: Bernstein DJ, Lange T (eds) Progress in cryptology – AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, 3–6 May 2010. Proceedings. Lecture Notes in Computer Science, vol 6055. Springer, pp 279–296. https://doi.org/10.1007/978-3-642-12678-9_17
Medwed M, Petit C, Regazzoni F, Renauld M, Standaert F (2011) Fresh re-keying II: securing multiple parties against side-channel and fault attacks. In: Prouff E (ed) Smart Card Research and Advanced Applications – 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, 14–16 Sept 2011. Revised Selected Papers. Lecture Notes in Computer Science, vol 7079. Springer, pp 115–132. https://doi.org/10.1007/978-3-642-27257-8_8
Mennink B (2020) Beyond birthday bound secure fresh rekeying: application to authenticated encryption. In: Moriai S, Wang H (eds) Advances in Cryptology – ASIACRYPT 2020 – 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, 7–11 Dec 2020, Proceedings, Part I. Lecture Notes in Computer Science, vol 12491. Springer, pp 630–661. https://doi.org/10.1007/978-3-030-64837-4_21
Pessl P, Mangard S (2016) Enhancing side-channel analysis of binary-field multiplication with bit reliability. In: Sako K (ed) Topics in cryptology – CT-RSA 2016 – The Cryptographers’ Track at the RSA Conference 2016, San Francisco, 29 Feb–4 Mar 2016. Proceedings. Lecture Notes in Computer Science, vol 9610. Springer, pp 255–270. https://doi.org/10.1007/978-3-319-29485-8_15
Pietrzak K (2009) A leakage-resilient mode of operation. In: Joux A (ed) Advances in Cryptology – EUROCRYPT 2009. Springer, Berlin/Heidelberg, pp 462–482
Unterluggauer T, Werner M, Mangard S (2017) Side-channel plaintext-recovery attacks on leakage-resilient encryption. In: Atienza D, Natale GD (eds) Design, Automation & Test in Europe Conference & Exhibition, DATE 2017, Lausanne, 27–31 Mar 2017. IEEE, pp 1318–1323. https://doi.org/10.23919/DATE.2017.7927197
Xi X, Aysu A, Orshansky M (2018) Fresh re-keying with strong PUFs: a new approach to side-channel security. In: 2018 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2018, Washington, DC, 30 Apr–4 May 2018. IEEE Computer Society, pp 118–125. https://doi.org/10.1109/HST.2018.8383899
Yu Y, Standaert FX, Pereira O, Yung M (2010) Practical leakage-resilient pseudorandom generators. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS’10. Association for Computing Machinery, New York, pp 141–151. https://doi.org/10.1145/1866307.1866324
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2023 Springer Science+Business Media LLC
About this entry
Cite this entry
Medwed, M. (2023). Fresh Re-keying. In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27739-9_1702-1
Download citation
DOI: https://doi.org/10.1007/978-3-642-27739-9_1702-1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27739-9
Online ISBN: 978-3-642-27739-9
eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering