{"id":"https://openalex.org/W4324139584","doi":"https://doi.org/10.46586/tosc.v2023.i1.288-315","title":"Secure Message Authentication in the Presence of Leakage and Faults","display_name":"Secure Message Authentication in the Presence of Leakage and Faults","publication_year":2023,"publication_date":"2023-03-10","ids":{"openalex":"https://openalex.org/W4324139584","doi":"https://doi.org/10.46586/tosc.v2023.i1.288-315"},"language":"en","primary_location":{"id":"doi:10.46586/tosc.v2023.i1.288-315","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2023.i1.288-315","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/10315/9756","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tosc.iacr.org/index.php/ToSC/article/download/10315/9756","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101197112","display_name":"Francesco Berti","orcid":null},"institutions":[{"id":"https://openalex.org/I13955877","display_name":"Bar-Ilan University","ror":"https://ror.org/03kgsv495","country_code":"IL","type":"education","lineage":["https://openalex.org/I13955877"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Francesco Berti","raw_affiliation_strings":["Bar-Ilan University, Ramat Gan, Israel"],"affiliations":[{"raw_affiliation_string":"Bar-Ilan University, Ramat Gan, Israel","institution_ids":["https://openalex.org/I13955877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082531689","display_name":"Chunxian Guo","orcid":"https://orcid.org/0000-0002-2603-7181"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]},{"id":"https://openalex.org/I119203015","display_name":"Shandong University of Technology","ror":"https://ror.org/02mr3ar13","country_code":"CN","type":"education","lineage":["https://openalex.org/I119203015"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chun Guo","raw_affiliation_strings":["School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China; Shandong Research Institute of Industrial Technology, Jinan, Shandong, China","School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China","Shandong Research Institute of Industrial Technology, Jinan, Shandong, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China; Shandong Research Institute of Industrial Technology, Jinan, Shandong, China","institution_ids":["https://openalex.org/I80143920","https://openalex.org/I119203015"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"Shandong Research Institute of Industrial Technology, Jinan, Shandong, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070278946","display_name":"Thomas Peters","orcid":"https://orcid.org/0000-0003-0835-6696"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Thomas Peters","raw_affiliation_strings":["UCLouvain, ICTEAM/ELEN/Crypto Group, Louvain-la-Neuve, Belgium"],"affiliations":[{"raw_affiliation_string":"UCLouvain, ICTEAM/ELEN/Crypto Group, Louvain-la-Neuve, Belgium","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008927000","display_name":"Yaobin Shen","orcid":"https://orcid.org/0000-0002-9549-4538"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yaobin Shen","raw_affiliation_strings":["UCLouvain, ICTEAM/ELEN/Crypto Group, Louvain-la-Neuve, Belgium"],"affiliations":[{"raw_affiliation_string":"UCLouvain, ICTEAM/ELEN/Crypto Group, Louvain-la-Neuve, Belgium","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070542865","display_name":"Fran\u00e7ois\u2010Xavier Standaert","orcid":"https://orcid.org/0000-0001-7444-0285"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fran\u00e7ois-Xavier Standaert","raw_affiliation_strings":["UCLouvain, ICTEAM/ELEN/Crypto Group, Louvain-la-Neuve, Belgium"],"affiliations":[{"raw_affiliation_string":"UCLouvain, ICTEAM/ELEN/Crypto Group, Louvain-la-Neuve, Belgium","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101197112"],"corresponding_institution_ids":["https://openalex.org/I13955877"],"apc_list":null,"apc_paid":null,"fwci":0.5274,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.69869119,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"288","last_page":"315"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7482312321662903},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.672213613986969},{"id":"https://openalex.org/keywords/cryptographic-nonce","display_name":"Cryptographic nonce","score":0.5692905783653259},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5589019060134888},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5409747958183289},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5229383707046509},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5114101767539978},{"id":"https://openalex.org/keywords/fault-injection","display_name":"Fault injection","score":0.4583094120025635},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.42362383008003235},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36078810691833496},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17680203914642334},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.12171140313148499}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7482312321662903},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.672213613986969},{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.5692905783653259},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5589019060134888},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5409747958183289},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5229383707046509},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5114101767539978},{"id":"https://openalex.org/C2775928411","wikidata":"https://www.wikidata.org/wiki/Q2041312","display_name":"Fault injection","level":3,"score":0.4583094120025635},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.42362383008003235},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36078810691833496},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17680203914642334},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.12171140313148499},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.46586/tosc.v2023.i1.288-315","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2023.i1.288-315","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/10315/9756","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:dial.uclouvain.be:boreal:275787","is_oa":true,"landing_page_url":"http://hdl.handle.net/2078.1/275787","pdf_url":null,"source":{"id":"https://openalex.org/S4306401902","display_name":"Digital Access to Libraries (Universit\u00e9 catholique de Louvain (UCL), l'Universit\u00e9 de Namur (UNamur) and the Universit\u00e9 Saint-Louis (USL-B))","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I95674353","host_organization_name":"UCLouvain","host_organization_lineage":["https://openalex.org/I95674353"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transaction on Symmetyric Cryptology, Vol. 2023, no.1, p. 288\u2013315 (2023)","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:doaj.org/article:8ebc1d57304a49f5a774efbdcb74c704","is_oa":true,"landing_page_url":"https://doaj.org/article/8ebc1d57304a49f5a774efbdcb74c704","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 1 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tosc.v2023.i1.288-315","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2023.i1.288-315","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/10315/9756","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1329855610","display_name":null,"funder_award_id":"project","funder_id":"https://openalex.org/F4320321390","funder_display_name":"Fonds De La Recherche Scientifique - FNRS"},{"id":"https://openalex.org/G1835803654","display_name":null,"funder_award_id":"National Research Center for Applied Cybersecurity ATHENE","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"},{"id":"https://openalex.org/G4838704522","display_name":null,"funder_award_id":"in part","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"},{"id":"https://openalex.org/G8566578122","display_name":null,"funder_award_id":"ATHENE","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"},{"id":"https://openalex.org/G885663608","display_name":null,"funder_award_id":"senior","funder_id":"https://openalex.org/F4320321390","funder_display_name":"Fonds De La Recherche Scientifique - FNRS"}],"funders":[{"id":"https://openalex.org/F4320321114","display_name":"Bundesministerium f\u00fcr Bildung und Forschung","ror":"https://ror.org/04pz7b180"},{"id":"https://openalex.org/F4320321390","display_name":"Fonds De La Recherche Scientifique - FNRS","ror":"https://ror.org/03q83t159"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4324139584.pdf"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W116480387","https://openalex.org/W154022573","https://openalex.org/W930621015","https://openalex.org/W1607006990","https://openalex.org/W1663689473","https://openalex.org/W2061496435","https://openalex.org/W2085992264","https://openalex.org/W2097651164","https://openalex.org/W2111725598","https://openalex.org/W2118629598","https://openalex.org/W2613550625","https://openalex.org/W2766582659","https://openalex.org/W2951150472","https://openalex.org/W2954193644","https://openalex.org/W2977871400","https://openalex.org/W3003185916","https://openalex.org/W3003412575","https://openalex.org/W3005561177","https://openalex.org/W3005704743","https://openalex.org/W3013677143","https://openalex.org/W3022090580","https://openalex.org/W3085353452","https://openalex.org/W3088704016","https://openalex.org/W3134124551","https://openalex.org/W3157476615","https://openalex.org/W3174389858","https://openalex.org/W3207283289","https://openalex.org/W4237037674","https://openalex.org/W4256518655"],"related_works":["https://openalex.org/W4253338219","https://openalex.org/W2955290832","https://openalex.org/W2967757647","https://openalex.org/W141793162","https://openalex.org/W2766321958","https://openalex.org/W2376652919","https://openalex.org/W2676406993","https://openalex.org/W2038076063","https://openalex.org/W2950720048","https://openalex.org/W2158296297"],"abstract_inverted_index":{"Security":[0],"against":[1,25,89,189],"side-channels":[2],"and":[3,64,70,101,107,168,185],"faults":[4,176],"is":[5,74,164,181],"a":[6,34,51,62,82,99,113,120],"must":[7,133],"for":[8,123,152],"the":[9,43,138,157,170],"deployment":[10],"of":[11,17,54,85],"embedded":[12],"cryptography.":[13],"A":[14],"wide":[15],"body":[16],"research":[18],"has":[19],"investigated":[20],"solutions":[21,38],"to":[22,33,75,104,149,172,177],"secure":[23],"implementations":[24],"these":[26],"attacks":[27],"at":[28],"different":[29],"abstraction":[30],"levels.":[31],"Yet,":[32],"large":[35,175],"extent,":[36],"current":[37],"focus":[39],"on":[40,166,183],"one":[41],"or":[42],"other":[44,180],"threat.":[45],"In":[46],"this":[47,94],"paper,":[48],"we":[49,96],"initiate":[50],"mode-level":[52],"study":[53],"cryptographic":[55],"primitives":[56],"that":[57,78,112],"can":[58,141,160],"ensure":[59],"security":[60,151,188],"in":[61],"(new":[63],"practically-motivated)":[65],"adversarial":[66],"model":[67,103],"combining":[68],"leakage":[69,106],"faults.":[71,108,191],"Our":[72],"goal":[73],"identify":[76],"constructions":[77],"do":[79],"not":[80],"require":[81],"uniform":[83],"protection":[84],"all":[86],"their":[87],"operations":[88],"both":[90],"attack":[91],"vectors.":[92],"For":[93],"purpose,":[95],"first":[97],"introduce":[98],"versatile":[100],"intuitive":[102],"capture":[105],"We":[109,144],"then":[110],"show":[111],"MAC":[114],"from":[115],"Asiacrypt":[116],"2021":[117],"natively":[118],"enables":[119],"leveled":[121],"implementation":[122],"fault":[124,153],"resilience":[125,154],"where":[126],"only":[127,137],"its":[128],"underlying":[129],"tweakable":[130],"block":[131],"cipher":[132],"be":[134,142,161],"protected,":[135],"if":[136],"tag":[139,158],"verification":[140],"faulted.":[143,162],"finally":[145],"describe":[146],"two":[147],"approaches":[148],"amplify":[150],"when":[155],"also":[156],"generation":[159],"One":[163],"based":[165,182],"iteration":[167],"requires":[169],"adversary":[171],"inject":[173],"increasingly":[174],"succeed.":[178],"The":[179],"randomness":[184],"allows":[186],"provable":[187],"differential":[190]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
