Narrow your search

Library

KU Leuven (7)

KBC (3)

Odisee (3)

Thomas More Kempen (3)

Thomas More Mechelen (3)

UCLL (3)

UGent (3)

ULB (3)

ULiège (3)

VIVES (3)


Resource type

dissertation (4)

book (3)


Language

English (7)


Year
From To Submit

2018 (7)

Listing 1 - 7 of 7
Sort by

Book
Advances in Cryptology – EUROCRYPT 2018 : 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I
Authors: ---
ISBN: 3319783815 3319783807 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018. The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical sections: foundations; lattices; random oracle model; fully homomorphic encryption; permutations; galois counter mode; attribute-based encryption; secret sharing; blockchain; multi-collision resistance; signatures; private simultaneous messages; masking; theoretical multiparty computation; obfuscation; symmetric cryptanalysis; zero-knowledge; implementing multiparty computation; non-interactive zero-knowledge; anonymous communication; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cryptography. .

Keywords

Computer science. --- Software engineering. --- Data encryption (Computer science). --- Coding theory. --- Data mining. --- Artificial intelligence. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Software Engineering/Programming and Operating Systems. --- Coding and Information Theory. --- Computers and Society. --- Data Mining and Knowledge Discovery. --- Artificial Intelligence (incl. Robotics). --- Civilization and computers --- Civilization --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer software engineering --- Engineering --- Informatics --- Science --- Cryptology. --- Artificial Intelligence. --- Data encryption (Computer science) --- Computer networks --- Security measures --- Information theory. --- Communication theory --- Communication --- Cybernetics


Book
Advances in Cryptology – EUROCRYPT 2018 : 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III
Authors: ---
ISBN: 3319783726 3319783718 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018. The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical sections: foundations; lattices; random oracle model; fully homomorphic encryption; permutations; galois counter mode; attribute-based encryption; secret sharing; blockchain; multi-collision resistance; signatures; private simultaneous messages; masking; theoretical multiparty computation; obfuscation; symmetric cryptanalysis; zero-knowledge; implementing multiparty computation; non-interactive zero-knowledge; anonymous communication; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cyptography. .

Keywords

Computer science. --- Software engineering. --- Data encryption (Computer science). --- Coding theory. --- Data mining. --- Artificial intelligence. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Software Engineering/Programming and Operating Systems. --- Coding and Information Theory. --- Computers and Society. --- Data Mining and Knowledge Discovery. --- Artificial Intelligence (incl. Robotics). --- Civilization and computers --- Civilization --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer software engineering --- Engineering --- Informatics --- Science --- Cryptology. --- Artificial Intelligence. --- Data encryption (Computer science) --- Information theory. --- Communication theory --- Communication --- Cybernetics


Book
Advances in Cryptology – EUROCRYPT 2018 : 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part II
Authors: ---
ISBN: 3319783750 3319783742 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018. The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical sections: foundations; lattices; random oracle model; fully homomorphic encryption; permutations; galois counter mode; attribute-based encryption; secret sharing; blockchain; multi-collision resistance; signatures; private simultaneous messages; masking; theoretical multiparty computation; obfuscation; symmetric cryptanalysis; zero-knowledge; implementing multiparty computation; non-interactive zero-knowledge; anonymous communication; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cyptography. .

Keywords

Computer science. --- Software engineering. --- Data encryption (Computer science). --- Coding theory. --- Data mining. --- Artificial intelligence. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Software Engineering/Programming and Operating Systems. --- Coding and Information Theory. --- Computers and Society. --- Data Mining and Knowledge Discovery. --- Artificial Intelligence (incl. Robotics). --- Civilization and computers --- Civilization --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer software engineering --- Engineering --- Informatics --- Science --- Cryptology. --- Artificial Intelligence. --- Computers --- Access control --- Information theory. --- Communication theory --- Communication --- Cybernetics


Dissertation
Techniques for Block Cipher Cryptanalysis

Loading...
Export citation

Choose an application

Bookmark

Abstract

The research interests of my PhD study are the analysis and design of symmetric-key primitives, especially block ciphers. Block ciphers are the basis of symmetric-key cryptography. During the last two decades, comprehensive insights on the analytic methods and the design criteria are developed. For cryptanalysts, a major question is to find good distinguishers, such as differential characteristics and linear trails. One of my main interests will be the computer-aid automatic search of distinguishers, which may free analysts from intensive manual works. Among various cryptanalytic methods, links and connections between them can be explored. Apart from the theoretical importance, it also helps with deducing the provable bounds against certain cryptanalyses. Furthermore, with a better understanding into the existing cryptanalyses, we may be able to create novel cryptanalytic methods based on the previous ones, and find improved attacks. On the other hand, in order to resist known attacks and achieve better hardware implementations, the design philosophy of block ciphers is also extensively studied. An interesting question is the tradeoff between the lightweight components for block ciphers and its security margin. In particular, I am interested in the construction of new components in the aspect of mathematics.

Keywords


Dissertation
Cryptography Secured Against Side-Channel Attacks
Authors: --- --- ---
Year: 2018 Publisher: Leuven KU Leuven. Faculty of Engineering Science

Loading...
Export citation

Choose an application

Bookmark

Abstract

Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. These attacks exploit characteristics of hardware implementations to compromise cryptosystems more easily than promised by the cryptanalytic security.Two categories of side-channel attacks can be distinguished: side-channel analysis and fault attacks. The former attempts to retrieve sensitive information by passively observing data or operation dependent leakages in the power consumption or electromagnetic radiation. The latter, on the other hand, attempts to reveal secrets by actively injecting faults in the circuitry. More advanced attacks mix both methods, resulting in combined attacks.A numberof countermeasures have been proposed for both types of attacks.Threshold Implementations is a countermeasure against side-channel analysis. It provides provable security against differential power analysis in the presence of hardware glitches. It furthermore offers a smaller area and higher throughput than countermeasures with equal security.Thwarting fault attacks often rely on duplication of the cryptographic algorithm resulting in either a larger area or a longer execution time. Furthermore, redundancy is commonly added to the intermediate variables, resulting in a further increase of the area. In the constrained environments in which embedded cryptosystems are deployed,these overheads should be avoided.In this project, Threshold Implementations will be extended to achieve provable security against fault attacks and combined attacks. Care will be taken to design these with minimal overhead on the implementation cost. After verification of the security of the countermeasures on FPGAs, the introduced overhead will be determined precisely and its cost and effectiveness will be evaluated.

Keywords


Dissertation
Protecting Keccak against combined side-channel and fault attacks

Loading...
Export citation

Choose an application

Bookmark

Abstract

When deployed in a potentially hostile environment, security-critical devices are susceptible to physical attacks. In particular, an adversary can mount devastating attacks by exploiting the side-channel leakage of a device or by actively introducing faults in the cryptographic computations. Countering these threats constitutes an active research topic. In contrast to side-channel countermeasures, of which the security properties are well understood, the literature surrounding fault attack resistance is much less developed. Even less mature are countermeasures that resist the combined application of both attack vectors. An interesting proposal in this context is CAPA, an algorithm-level countermeasure methodology that provides security against combined physical attacks in a very strong adversarial model. This thesis aims to contribute to the development and evaluation of combined countermeasures by applying the CAPA methodology to protect Keccak against combined physical attacks. Most influential due to their standardization as SHA-3, the Keccak sponge functions play an important role in symmetric-key cryptography. By presenting four secure hardware designs of Keccak, we explore the far-reaching speed-area tradeoff. %that plays an essential role in the design space of any hardware masking countermeasure. Depending on the Keccak permutation width, our low-latency implementation is either faster than or competitive to the previous side-channel protected implementations in the literature. At the other end of the spectrum, very compact implementations are obtained that are up to fifty times smaller than their high-speed counterparts. Resulting from these efforts are, to the best of our knowledge, the first implementations of Keccak with resistance against combined side-channel and fault attacks. The security against these threats can be scaled to arbitrary order by parametrization of the design. To aid the system designer, we assess the performance and implementation overhead of the countermeasure as a function of the security parameters. In addition, we introduce a more resource-efficient implementation of the CAPA preprocessing stage that applies generally to all cryptographic algorithms. To verify the security of the designs, we subjugate a suitable and representative Keccak implementation to state-of-the-art side-channel evaluation tests on an FPGA platform. No leakage is detected given the statistical evidence of 80 million power traces.

Keywords


Dissertation
A Framework for Fault Sensitivity Analysis

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Fault Sensitivity Analysis (FSA) attack is one of the fault-based attacks that can retrieve secret keys of a cryptography system by injecting different kinds of fault into the system, observing and analyzing the outcoming side-channel information. In this thesis, we study and compare the different type of physical attacks to find out the advantages and disadvantages of each attack method. Then we dig more into the FSA attack, looking into the principle, application and implementation of the attack method. Finally, we perform an FSA attack by injecting clock glitches during operation and apply this attack to the Sbox of Advanced Encryption Standard (AES). We complete the automation of profiling phase and successfully retrieve the key from the Sbox.

Keywords

Listing 1 - 7 of 7
Sort by