On Higher-Order Cryptography
B Barak, R Crubillé, U Dal Lago - … on Automata, Languages, and …, 2020 - drops.dagstuhl.de
… instance of a secure higher-order cryptographic primitive can be … We prove on the one hand
that those constructions are not … of studying higher-order forms of cryptography is actually …
that those constructions are not … of studying higher-order forms of cryptography is actually …
On higher-order cryptography (long version)
… So, appealing as it is, our objective of studying higher-order forms of cryptography is bound
to be nontrivial, even from a purely definitional point of view. The contributions of this paper …
to be nontrivial, even from a purely definitional point of view. The contributions of this paper …
Provably secure higher-order masking of AES
… In [17], Ishai et al. propose a higher-order masking scheme (referred to as ISW in this paper)
… We apply this idea to design a secure higher-order masking scheme for the AES and we …
… We apply this idea to design a secure higher-order masking scheme for the AES and we …
Higher-order homophonic ciphers
C Hammer - Cryptologia, 1981 - Taylor & Francis
… On the contrary, we believe it to be a signal, indicating that the (authorized and informed)
recipient of the message is on the right … or other about the astuteness of cryptographic analysts“. …
recipient of the message is on the right … or other about the astuteness of cryptographic analysts“. …
A higher-order indistinguishability logic for cryptographic reasoning
D Baelde, A Koutsos… - … ACM/IEEE Symposium on …, 2023 - ieeexplore.ieee.org
… the meta-logic on top of the … cryptographic rules to reason about corruption. This theoretical
work justifies our extension of SQUIRREL with higher-order reasoning, which we illustrate on …
work justifies our extension of SQUIRREL with higher-order reasoning, which we illustrate on …
On the higher order nonlinearities of algebraic immune functions
C Carlet - Advances in Cryptology-CRYPTO 2006: 26th Annual …, 2006 - Springer
… higher order differential attack” on block ciphers due to Knudsen and Lai [26,28] depends on
… relevance to cryptography, since this change does not fundamentally modify the robustness …
… relevance to cryptography, since this change does not fundamentally modify the robustness …
Revisiting higher-order masked comparison for lattice-based cryptography: Algorithms and bit-sliced implementations
JP D'Anvers, M Van Beirendonck… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… of latticebased cryptographic schemes. In this paper we will specifically focus on lattice-based …
These leakages give an adversary extra information that could be used to break the crypto…
These leakages give an adversary extra information that could be used to break the crypto…
Hiding Higher-Order Side-Channel Leakage: Randomizing Cryptographic Implementations in Reconfigurable Hardware
… focus on effects of our countermeasure on higher-order statistical properties and moments
and show that our approach can increase the protection against higher-order … information on …
and show that our approach can increase the protection against higher-order … information on …
Higher-order masked ciphertext comparison for lattice-based cryptography
… a major bottleneck for higher-order secure implementations. … In this work, we first show a
higher-order side-channel attack … ciphertexts in higher-order masked schemes based on the (…
higher-order side-channel attack … ciphertexts in higher-order masked schemes based on the (…
Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt
NT Courtois - Information Security and Cryptology—ICISC 2002: 5th …, 2003 - Springer
… cryptographic security relies on the hardness of largely overdefined problems. In public key
cryptography… In this paper we studied higher order correlation attacks on stream ciphers. Our …
cryptography… In this paper we studied higher order correlation attacks on stream ciphers. Our …