#### Filter Results:

- Full text PDF available (14)

#### Publication Year

2012

2017

- This year (2)
- Last 5 years (15)
- Last 10 years (15)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Olivier Pereira, François-Xavier Standaert, Srinivas Vivek
- ACM Conference on Computer and Communications…
- 2015

Leakage-resilient cryptosystems aim to maintain security in situations where their implementation leaks physical information about their internal secrets. Because of their efficiency and usability on a wide range of platforms, solutions based on symmetric primitives (such as block ciphers) are particularly attractive in this context. So far, the literature… (More)

- Jean-Sébastien Coron, Arnab Roy, Srinivas Vivek
- Journal of Cryptographic Engineering
- 2014

We describe a new technique for evaluating polynomials over binary finite fields. This is useful in the context of anti-DPA countermeasures when an S-box is expressed as a polynomial over a binary finite field. For $$n$$ n -bit S-boxes, our new technique has heuristic complexity $${\fancyscript{O}}(2^{n/2}/\sqrt{n})$$ O ( 2 n / 2 / n ) instead of… (More)

- David Galindo, Srinivas Vivek
- Selected Areas in Cryptography
- 2012

We propose a leakage-resilient signature scheme in the continual leakage model that is based on a well-known identity-based encryption scheme by Boneh and Boyen (Eurocrypt 2004). The proposed signature scheme is the most e cient among the existing schemes that allow for continual leakage. Its e ciency is close to that of non leakageresilient pairing-based… (More)

- Arnab Roy, Srinivas Vivek
- IACR Cryptology ePrint Archive
- 2013

Masking is a well-known technique used to prevent block cipher implementations from side-channel attacks. Higher-order side channel attacks (e.g. higher-order DPA attack) on widely used block cipher like AES have motivated the design of efficient higher-order masking schemes. Indeed, it is known that as the masking order increases, the difficulty of… (More)

- Anamaria Costache, Nigel P. Smart, Srinivas Vivek
- IACR Cryptology ePrint Archive
- 2016

We present a methodology to evaluate a Discrete Fourier Transform (DFT) on data which has been encrypted using a Somewhat Homomorphic Encryption (SHE) scheme, which is over 200 times faster than other methods. The technique utilizes the fact that the entire DFT algorithm is an algebraic operation over the underlying ring of the SHE scheme (for a suitably… (More)

- David Galindo, Srinivas Vivek
- Inf. Process. Lett.
- 2014

Recently it was conjectured that an ElGamal-based public-key encryption scheme with stateful decryption resists lunch-time chosen ciphertext and leakage attacks in the only computation leaks information model. We give a non-trivial upper bound on the amount of leakage tolerated by this conjecture. More precisely, we prove that the conjecture does not hold… (More)

- David Galindo, Johann Großschädl, Zhe Liu, Praveen Kumar Vadnala, Srinivas Vivek
- IACR Cryptology ePrint Archive
- 2014

Leakage-resilient cryptography aims to extend the rigorous guarantees achieved through the provable security paradigm to physical implementations. The constructions and mechanisms designed on basis of this new approach inevitably suffer from an Achilles heel: a bounded leakage assumption is needed. Currently, a huge gap exists between the theory of such… (More)

- Anamaria Costache, Nigel P. Smart, Srinivas Vivek, A. Waller
- IACR Cryptology ePrint Archive
- 2016

- Jürgen Pulkus, Srinivas Vivek
- IACR Cryptology ePrint Archive
- 2016

In recent years, methods to securely mask S-boxes against side-channel attacks by representing them as polynomials over finite binary fields have become quite efficient. A good cost model for this is to count how many non-linear multiplications are needed. In this work we improve on the current state-of-the-art generic method published by Coron–Roy–Vivek at… (More)

- David Galindo, Srinivas Vivek
- IMA Int. Conf.
- 2013

Leakage-resilient cryptography aims at capturing side-channel attacks within the provable security framework. Currently there exists a plethora of schemes with provably secure guarantees against a variety of side-channel attacks. However, meeting the strongest security levels (resilience against continual leakage attacks) under the weakest assumptions leads… (More)