On Higher-Order Cryptography

B Barak, R Crubillé, U Dal Lago - … on Automata, Languages, and …, 2020 - drops.dagstuhl.de
… instance of a secure higher-order cryptographic primitive can be … We prove on the one hand
that those constructions are not … of studying higher-order forms of cryptography is actually …

On higher-order cryptography (long version)

B Barak, R Crubillé, UD Lago - arXiv preprint arXiv:2002.07218, 2020 - arxiv.org
… So, appealing as it is, our objective of studying higher-order forms of cryptography is bound
to be nontrivial, even from a purely definitional point of view. The contributions of this paper …

Provably secure higher-order masking of AES

M Rivain, E Prouff - … on Cryptographic Hardware and Embedded Systems, 2010 - Springer
… In [17], Ishai et al. propose a higher-order masking scheme (referred to as ISW in this paper)
… We apply this idea to design a secure higher-order masking scheme for the AES and we …

Higher-order homophonic ciphers

C Hammer - Cryptologia, 1981 - Taylor & Francis
On the contrary, we believe it to be a signal, indicating that the (authorized and informed)
recipient of the message is on the right … or other about the astuteness of cryptographic analysts“. …

A higher-order indistinguishability logic for cryptographic reasoning

D Baelde, A Koutsos… - … ACM/IEEE Symposium on …, 2023 - ieeexplore.ieee.org
… the meta-logic on top of the … cryptographic rules to reason about corruption. This theoretical
work justifies our extension of SQUIRREL with higher-order reasoning, which we illustrate on

On the higher order nonlinearities of algebraic immune functions

C Carlet - Advances in Cryptology-CRYPTO 2006: 26th Annual …, 2006 - Springer
higher order differential attack” on block ciphers due to Knudsen and Lai [26,28] depends on
… relevance to cryptography, since this change does not fundamentally modify the robustness …

Revisiting higher-order masked comparison for lattice-based cryptography: Algorithms and bit-sliced implementations

JP D'Anvers, M Van Beirendonck… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… of latticebased cryptographic schemes. In this paper we will specifically focus on lattice-based …
These leakages give an adversary extra information that could be used to break the crypto

Hiding Higher-Order Side-Channel Leakage: Randomizing Cryptographic Implementations in Reconfigurable Hardware

P Sasdrich, A Moradi, T Güneysu - … –CT-RSA 2017: The Cryptographers' …, 2017 - Springer
… focus on effects of our countermeasure on higher-order statistical properties and moments
and show that our approach can increase the protection against higher-order … information on

Higher-order masked ciphertext comparison for lattice-based cryptography

JP D'Anvers, D Heinz, P Pessl… - Cryptology ePrint …, 2021 - eprint.iacr.org
… a major bottleneck for higher-order secure implementations. … In this work, we first show a
higher-order side-channel attack … ciphertexts in higher-order masked schemes based on the (…

Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt

NT Courtois - Information Security and Cryptology—ICISC 2002: 5th …, 2003 - Springer
cryptographic security relies on the hardness of largely overdefined problems. In public key
cryptography… In this paper we studied higher order correlation attacks on stream ciphers. Our …