{"id":"https://openalex.org/W2766582659","doi":"https://doi.org/10.13154/tosc.v2017.i3.271-293","title":"On Leakage-Resilient Authenticated Encryption with Decryption Leakages","display_name":"On Leakage-Resilient Authenticated Encryption with Decryption Leakages","publication_year":2017,"publication_date":"2017-09-19","ids":{"openalex":"https://openalex.org/W2766582659","doi":"https://doi.org/10.13154/tosc.v2017.i3.271-293","mag":"2766582659"},"language":"en","primary_location":{"id":"pmh:oai:dial.uclouvain.be:boreal:189870","is_oa":false,"landing_page_url":"http://hdl.handle.net/2078.1/189870","pdf_url":null,"source":{"id":"https://openalex.org/S4306401974","display_name":"DIAL (Catholic University of Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Vol. 3, p. 271\u00e2\u0080\u0093293 (2017)","raw_type":"info:eu-repo/semantics/article"},"type":"article","indexed_in":["datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://hdl.handle.net/2078.1/211894","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045715085","display_name":"Francesco Berti","orcid":"https://orcid.org/0000-0002-3558-7177"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Berti, Francesco","raw_affiliation_strings":["UCLouvain, ICTEAM \u2013 Crypto Group\r\nB-1348 Louvain-la-Neuve"],"affiliations":[{"raw_affiliation_string":"UCLouvain, ICTEAM \u2013 Crypto Group\r\nB-1348 Louvain-la-Neuve","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061506240","display_name":"Olivier Pereira","orcid":"https://orcid.org/0000-0002-1901-3587"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pereira, Olivier","raw_affiliation_strings":["UCLouvain, ICTEAM \u2013 Crypto Group\r\nB-1348 Louvain-la-Neuve"],"affiliations":[{"raw_affiliation_string":"UCLouvain, ICTEAM \u2013 Crypto Group\r\nB-1348 Louvain-la-Neuve","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070278946","display_name":"Thomas Peters","orcid":"https://orcid.org/0000-0003-0835-6696"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Peters, Thomas","raw_affiliation_strings":["UCLouvain, ICTEAM \u2013 Crypto Group\r\nB-1348 Louvain-la-Neuve"],"affiliations":[{"raw_affiliation_string":"UCLouvain, ICTEAM \u2013 Crypto Group\r\nB-1348 Louvain-la-Neuve","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070542865","display_name":"Fran\u00e7ois\u2010Xavier Standaert","orcid":"https://orcid.org/0000-0001-7444-0285"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Standaert, Fran\u00e7ois-Xavier","raw_affiliation_strings":["UCLouvain, ICTEAM \u2013 Crypto Group\r\nB-1348 Louvain-la-Neuve"],"affiliations":[{"raw_affiliation_string":"UCLouvain, ICTEAM \u2013 Crypto Group\r\nB-1348 Louvain-la-Neuve","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5045715085"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.2905,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.95436185,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authenticated-encryption","display_name":"Authenticated encryption","score":0.7983821630477905},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6395801901817322},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6043466925621033},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.5948615670204163},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4527941942214966},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.34366345405578613}],"concepts":[{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.7983821630477905},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6395801901817322},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6043466925621033},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.5948615670204163},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4527941942214966},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34366345405578613},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"pmh:oai:dial.uclouvain.be:boreal:189870","is_oa":false,"landing_page_url":"http://hdl.handle.net/2078.1/189870","pdf_url":null,"source":{"id":"https://openalex.org/S4306401974","display_name":"DIAL (Catholic University of Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Vol. 3, p. 271\u00e2\u0080\u0093293 (2017)","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:dial.uclouvain.be:boreal:211894","is_oa":true,"landing_page_url":"http://hdl.handle.net/2078.1/211894","pdf_url":null,"source":{"id":"https://openalex.org/S4306401902","display_name":"Digital Access to Libraries (Universit\u00e9 catholique de Louvain (UCL), l'Universit\u00e9 de Namur (UNamur) and the Universit\u00e9 Saint-Louis (USL-B))","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I95674353","host_organization_name":"UCLouvain","host_organization_lineage":["https://openalex.org/I95674353"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"TOSC 2017 (FSE): IACR Transactions on Symmetric Cryptology, Vol. 2017, no. 3, p. 271-293 (2017)","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:doaj.org/article:791e129a872341d682562da8da2f82ba","is_oa":true,"landing_page_url":"https://doaj.org/article/791e129a872341d682562da8da2f82ba","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Pp 271-293 (2017)","raw_type":"article"},{"id":"doi:10.13154/tosc.v2017.i3.271-293","is_oa":true,"landing_page_url":"https://doi.org/10.13154/tosc.v2017.i3.271-293","pdf_url":null,"source":{"id":"https://openalex.org/S7407052971","display_name":"UB Bochum","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:dial.uclouvain.be:boreal:211894","is_oa":true,"landing_page_url":"http://hdl.handle.net/2078.1/211894","pdf_url":null,"source":{"id":"https://openalex.org/S4306401902","display_name":"Digital Access to Libraries (Universit\u00e9 catholique de Louvain (UCL), l'Universit\u00e9 de Namur (UNamur) and the Universit\u00e9 Saint-Louis (USL-B))","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I95674353","host_organization_name":"UCLouvain","host_organization_lineage":["https://openalex.org/I95674353"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"TOSC 2017 (FSE): IACR Transactions on Symmetric Cryptology, Vol. 2017, no. 3, p. 271-293 (2017)","raw_type":"info:eu-repo/semantics/article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2592488952","https://openalex.org/W2757111556","https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4289281780","https://openalex.org/W2359552542","https://openalex.org/W2374897487"],"abstract_inverted_index":{"At":[0],"CCS":[1],"2015,":[2],"Pereira":[3],"et":[4],"al.":[5],"introduced":[6],"a":[7,24,98,140],"pragmatic":[8],"model":[9,28],"enabling":[10],"the":[11,20,34,48,64,80,109,128],"study":[12],"of":[13,23,40,82,157],"leakage-resilient":[14],"symmetric":[15],"cryptographic":[16],"primitives":[17],"based":[18],"on":[19],"minimal":[21],"use":[22],"leak-free":[25],"component.":[26],"This":[27],"was":[29],"recently":[30],"used":[31],"to":[32,89],"prove":[33],"good":[35,154],"integrity":[36,81,147],"and":[37,86,122,138],"confidentiality":[38,96,129],"properties":[39,148],"an":[41,101],"authenticated":[42],"encryption":[43,53],"scheme":[44],"called":[45],"DTE":[46,83],"when":[47],"adversary":[49,102],"is":[50,114],"only":[51],"given":[52],"leakages.":[54],"In":[55],"this":[56,60,136],"paper,":[57],"we":[58],"extend":[59],"work":[61],"by":[62,116],"analyzing":[63],"case":[65,137],"where":[66,100],"decryption":[67,105],"leakages":[68,78,106],"are":[69,152],"also":[70],"available.":[71],"We":[72,92,125],"first":[73],"exhibit":[74],"attacks":[75],"exploiting":[76],"such":[77,118],"against":[79],"(and":[84],"variants)":[85],"show":[87],"how":[88],"mitigate":[90],"them.":[91],"then":[93],"consider":[94],"message":[95],"in":[97,135],"context":[99],"can":[103,132],"observe":[104],"but":[107],"not":[108],"corresponding":[110],"messages.":[111],"The":[112],"latter":[113],"motivated":[115],"applications":[117],"as":[119,153,155],"secure":[120],"bootloading":[121],"bitstream":[123],"decryption.":[124],"finally":[126],"formalize":[127],"requirements":[130],"that":[131,151],"be":[133],"achieved":[134],"propose":[139],"new":[141],"construction":[142],"satisfying":[143],"them,":[144],"while":[145],"providing":[146],"with":[149],"leakage":[150],"those":[156],"DTE.":[158]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":4}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
