All You Need is XOR-Convolution: A Generalized Higher-Order Side-Channel Attack with Application to XEX/XE-based Encryptions
The XEX/XE scheme has been widely used to realize authenticated encryptions (AEs), message authentication codes (MACs), and storage encryptions, such as OCB, PMAC, and XTS. Although these schemes have been extensively deployed in the real world, limited studies have evaluated side-channel attacks (...
Saved in:
| Main Authors: | Rei Ueno, Akira Ito, Yosuke Todo, Akiko Inoue, Kazuhiko Minematsu, Hibiki Ishikawa, Naofumi Homma |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Ruhr-Universität Bochum
2025-06-01
|
| Series: | Transactions on Cryptographic Hardware and Embedded Systems |
| Subjects: | |
| Online Access: | https://tches.iacr.org/index.php/TCHES/article/view/12219 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Blind mask template attacks on masked cryptographic algorithm
by: Yi WANG, et al.
Published: (2019-01-01) -
Template attack of Crypto chip based on clustering
by: Zhen WU, et al.
Published: (2018-08-01) -
Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks
by: Abdinasir Hirsi, et al.
Published: (2025-01-01) -
Preimage and collision attacks on reduced Ascon using algebraic strategies
by: Qinggan Fu, et al.
Published: (2025-05-01) -
Perceived Information Revisited II
by: Akira Ito, et al.
Published: (2024-12-01)