Publications
Edited books
Advances in Cryptology – EUROCRYPT 2023
In 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part II. Vol. 14005. Cham: Springer Nature Switzerland, 2023.Status: Published
Advances in Cryptology – EUROCRYPT 2023
Afilliation | Cryptography |
Project(s) | Cryptography Section |
Publication Type | Edited books |
Year of Publication | 2023 |
Secondary Title | 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part II |
Volume | 14005 |
Number of pages in book | XVI, 628 |
Date Published | 04/2023 |
Publisher | Springer Nature Switzerland |
Place Published | Cham |
ISBN Number | 978-3-031-30616-7 |
ISSN Number | 0302-9743 |
Other Numbers | LNCS 14005 |
Keywords | ciphertexts, communication protocols, Computer networks, Computer security, Cryptanalysis, Cryptography, Data mining, data security, Encryption, information theory, privacy preserving, public key cryptography |
URL | https://link.springer.com/10.1007/978-3-031-30617-4 |
DOI | 10.1007/978-3-031-30617-4 |
Advances in Cryptology – EUROCRYPT 2023
In 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part I. Vol. 14004. Cham: Springer Nature Switzerland, 2023.Status: Published
Advances in Cryptology – EUROCRYPT 2023
Afilliation | Cryptography |
Project(s) | Cryptography Section |
Publication Type | Edited books |
Year of Publication | 2023 |
Secondary Title | 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part I |
Volume | 14004 |
Publisher | Springer Nature Switzerland |
Place Published | Cham |
ISBN Number | 978-3-031-30544-3 |
ISSN Number | 0302-9743 |
Other Numbers | LNCS 14004 |
Keywords | ciphertexts, communication protocols, Computer networks, Computer security, Cryptanalysis, Cryptography, Data mining, data security, Encryption, information theory, privacy preserving, public key cryptography |
URL | https://link.springer.com/10.1007/978-3-031-30545-0 |
DOI | 10.1007/978-3-031-30545-0 |
Advances in Cryptology – EUROCRYPT 2023
In 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part III. Vol. 14006. Cham: Springer Nature Switzerland, 2023.Status: Published
Advances in Cryptology – EUROCRYPT 2023
Afilliation | Cryptography |
Project(s) | Cryptography Section |
Publication Type | Edited books |
Year of Publication | 2023 |
Secondary Title | 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part III |
Volume | 14006 |
Number of pages in book | XVI, 670 |
Date Published | 04/2023 |
Publisher | Springer Nature Switzerland |
Place Published | Cham |
ISBN Number | 978-3-031-30619-8 |
ISSN Number | 0302-9743 |
Other Numbers | LNCS 14006 |
Keywords | ciphertexts, communication protocols, Computer networks, Computer security, Cryptanalysis, Cryptography, Data mining, data security, Encryption, information theory, privacy preserving, public key cryptography |
URL | https://link.springer.com/10.1007/978-3-031-30620-4 |
DOI | 10.1007/978-3-031-30620-4 |
Proceedings, refereed
Multi-Instance Secure Public-Key Encryption
In PKC 2023, Part II. Cham: Springer Nature Switzerland, 2023.Status: Published
Multi-Instance Secure Public-Key Encryption
Mass surveillance targets many users at the same time with the goal of learning as much as possible. Intuitively, breaking many users’ cryptography simultaneously should be at least as hard as that of only breaking a single one, but ideally security degradation is gradual: an adversary ought to work harder to break more. Bellare, Ristenpart and Tessaro (Crypto’12) introduced the notion of multi-instance security to capture the related concept for password hashing with salts. Auerbach, Giacon and Kiltz (Eurocrypt’20) motivated the study of public key encryption (PKE) in the multi-instance setting, yet their technical results are exclusively stated in terms of key encapsulation mechanisms (KEMs), leaving a considerable gap. We investigate the multi-instance security of public key encryption. Our contributions are twofold. Firstly, we define and compare possible security notions for multi-instance PKE, where we include PKE schemes whose correctness is not perfect. Secondly, we observe that, in general, a hybrid encryption scheme of a multi-instance secure KEM and an arbitrary data encapsulation mechanism (DEM) is unlikely to inherit the KEM’s multi-instance security. Yet, we show how with a suitable information-theoretic DEM, and a computationally secure key derivation function if need be, inheritance is possible. As far as we are aware, ours is the first inheritance result in the challenging multi-bit scenario.
Afilliation | Cryptography |
Project(s) | Cryptography Section |
Publication Type | Proceedings, refereed |
Year of Publication | 2023 |
Conference Name | PKC 2023, Part II |
Pagination | 336-367 |
Date Published | 05/2023 |
Publisher | Springer Nature Switzerland |
Place Published | Cham |
ISBN Number | 978-3-031-31370-7 |
Other Numbers | LNCS 13941 |
Keywords | Hybrid Encryption, Mass Surveillance, Multi-Instance Security, Property Inheritance |
URL | https://doi.org/10.1007/978-3-031-31371-4_12 |
DOI | 10.1007/978-3-031-31371-4_12 |
Reprint Edition | https://eprint.iacr.org/2022/909 |
Journal Article
Pincering SKINNY by Exploiting Slow Diffusion: Enhancing Differential Power Analysis with Cluster Graph Inference
IACR Transactions on Cryptographic Hardware and Embedded Systems 2023 (2023).Status: Accepted
Pincering SKINNY by Exploiting Slow Diffusion: Enhancing Differential Power Analysis with Cluster Graph Inference
Afilliation | Cryptography |
Project(s) | Cryptography Section |
Publication Type | Journal Article |
Year of Publication | 2023 |
Journal | IACR Transactions on Cryptographic Hardware and Embedded Systems |
Volume | 2023 |
Number | 4 |
Publisher | IACR |
Place Published | Bochum, Germany |
Proceedings, refereed
On Evaluating Anonymity of Onion Routing
In Selected Areas in Cryptography (28th International Conference, Virtual Event, September 29 – October 1, 2021, Revised Selected Papers). Vol. 13203. Cham: Springer Nature Switzerland, 2022.Status: Published
On Evaluating Anonymity of Onion Routing
Anonymous communication networks (ACNs) aim to thwart an adversary,
who controls or observes chunks of the communication network,
from determining the respective identities of two communicating parties.
We focus on low-latency ACNs such as Tor, which target a practical level
of anonymity without incurring an unacceptable transmission delay.
While several definitions have been proposed to quantify the level of anonymity
provided by high-latency, message-centric ACNs (such as mix-nets and DC-nets),
this approach is less relevant to Tor, where user--destination pairs communicate
over secure overlay circuits. Moreover, existing evaluation methods of
traffic analysis attacks on Tor appear somewhat ad hoc and fragmented.
We propose a fair evaluation framework for such attacks against onion
routing systems by identifying and discussing the crucial components
for evaluation, including how to consider various adversarial goals,
how to factor in the adversarial ability to collect information relevant
to the attack, and how these components combine to suitable metrics to
quantify the adversary's success.
Afilliation | Cryptography |
Project(s) | Cryptography Section |
Publication Type | Proceedings, refereed |
Year of Publication | 2022 |
Conference Name | Selected Areas in Cryptography (28th International Conference, Virtual Event, September 29 – October 1, 2021, Revised Selected Papers) |
Volume | 13203 |
Pagination | 3-24 |
Publisher | Springer Nature Switzerland |
Place Published | Cham |
ISBN Number | 978-3-030-99276-7 |
ISSN Number | 0302-9743 |
URL | https://doi.org/10.1007/978-3-030-99277-4_1 |
DOI | 10.1007/978-3-030-99277-4_1 |
Edited books
Computational Cryptography: Algorithmic Aspects of Cryptology
In London Mathematical Society Lecture Note Series . Vol. 469. Cambridge, UK: Cambridge University Press, 2021.Status: Published
Computational Cryptography: Algorithmic Aspects of Cryptology
The area of computational cryptography is dedicated to the development of effective methods in algorithmic number theory that improve implementation of cryptosystems or further their cryptanalysis. This book is a tribute to Arjen K. Lenstra, one of the key contributors to the field, on the occasion of his 65th birthday, covering his best-known scientific achievements in the field. Students and security engineers will appreciate this no-nonsense introduction to the hard mathematical problems used in cryptography and on which cybersecurity is built, as well as the overview of recent advances on how to solve these problems from both theoretical and practical applied perspectives. Beginning with polynomials, the book moves on to the celebrated Lenstra–Lenstra–Lovász lattice reduction algorithm, and then progresses to integer factorization and the impact of these methods to the selection of strong cryptographic keys for usage in widely used standards.
Afilliation | Cryptography |
Project(s) | Cryptography Section |
Publication Type | Edited books |
Year of Publication | 2021 |
Secondary Title | London Mathematical Society Lecture Note Series |
Volume | 469 |
Edition | 1 |
Number of pages in book | 388 + xii |
Date Published | 11/2021 |
Publisher | Cambridge University Press |
Place Published | Cambridge, UK |
ISBN Number | 9781108795937 |
URL | https://www.cambridge.org/core/product/identifier/9781108854207/type/book |
DOI | 10.1017/9781108854207 |
Book Chapter
Introduction
In Computational Cryptography: Algorithmic Aspects of Cryptology, 1-12. Cambridge University Press, 2021.Status: Published
Introduction
Afilliation | Cryptography |
Project(s) | Simula UiB |
Publication Type | Book Chapter |
Year of Publication | 2021 |
Book Title | Computational Cryptography: Algorithmic Aspects of Cryptology |
Edition | 1 |
Chapter | 1 |
Series Volume | 469 |
Pagination | 1 - 12 |
Date Published | 11/2021 |
Publisher | Cambridge University Press |
ISBN Number | 9781108795937 |
URL | https://www.cambridge.org/core/product/identifier/9781108854207/type/boo... |
DOI | 10.1017/9781108854207.002 |
Introduction
In Computational Cryptography: Algorithmic Aspects of Cryptology, 1-12. Cambridge University Press, 2021.Status: Published
Introduction
Afilliation | Cryptography |
Project(s) | Simula UiB |
Publication Type | Book Chapter |
Year of Publication | 2021 |
Book Title | Computational Cryptography: Algorithmic Aspects of Cryptology |
Edition | 1 |
Chapter | 1 |
Series Volume | 469 |
Pagination | 1 - 12 |
Date Published | 11/2021 |
Publisher | Cambridge University Press |
ISBN Number | 9781108795937 |
URL | https://www.cambridge.org/core/product/identifier/9781108854207/type/boo... |
DOI | 10.1017/9781108854207.002 |
XTR and Tori
In Computational Cryptography: Algorithmic Aspects of Cryptology, 293-313. Cambridge, UK: Cambridge University Press, 2021.Status: Published
XTR and Tori
Afilliation | Cryptography |
Project(s) | Cryptography Section |
Publication Type | Book Chapter |
Year of Publication | 2021 |
Book Title | Computational Cryptography: Algorithmic Aspects of Cryptology |
Edition | 1 |
Chapter | 10 |
Pagination | 293 - 313 |
Date Published | 11/2021 |
Publisher | Cambridge University Press |
Place Published | Cambridge, UK |
ISBN Number | 9781108795937 |
URL | https://doi.org/10.1017/9781108854207.013 |
DOI | 10.1017/978110885420710.1017/9781108854207.013 |
XTR and Tori
In Computational Cryptography: Algorithmic Aspects of Cryptology, 293-313. Cambridge, UK: Cambridge University Press, 2021.Status: Published
XTR and Tori
Afilliation | Cryptography |
Project(s) | Cryptography Section |
Publication Type | Book Chapter |
Year of Publication | 2021 |
Book Title | Computational Cryptography: Algorithmic Aspects of Cryptology |
Edition | 1 |
Chapter | 10 |
Pagination | 293 - 313 |
Date Published | 11/2021 |
Publisher | Cambridge University Press |
Place Published | Cambridge, UK |
ISBN Number | 9781108795937 |
URL | https://doi.org/10.1017/9781108854207.013 |
DOI | 10.1017/978110885420710.1017/9781108854207.013 |
Proceedings, refereed
Tightness Subtleties for Multi-user PKE Notions
In 18th IMA International Conference on Cryptography and Coding. 18th ed. Vol. 13129. Cham: Springer International Publishing, 2021.Status: Published
Tightness Subtleties for Multi-user PKE Notions
Public key encryption schemes are increasingly being studied concretely, with an emphasis on tight bounds even in a multi-user setting. Here, two types of formalization have emerged, one with a single challenge bit and one with multiple challenge bits. Another modelling choice is whether to allow key corruptions or not. How tightly the various notions relate to each other has hitherto not been studied in detail. We show that in the absence of corruptions, single-bit left-or-right indistinguishability is the preferred notion, as it tightly implies the other (corruption-less) notions. However, in the presence of corruptions, this implication no longer holds; we suggest the use of a more general notion that tightly implies both existing options. Furthermore, for completeness we study how the relationship between left-or-right versus real-or-random evolves in the multi-user PKE setting.
Afilliation | Cryptography |
Project(s) | Simula UiB |
Publication Type | Proceedings, refereed |
Year of Publication | 2021 |
Conference Name | 18th IMA International Conference on Cryptography and Coding |
Volume | 13129 |
Edition | 18 |
Pagination | 75 - 104 |
Date Published | 12/2021 |
Publisher | Springer International Publishing |
Place Published | Cham |
ISBN Number | 978-3-030-92640-3 |
ISSN Number | 0302-9743 |
URL | https://link.springer.com/content/pdf/10.1007/978-3-030-92641-0_5 |
DOI | 10.1007/978-3-030-92641-010.1007/978-3-030-92641-0_5 |
Journal Article
Redundant Code-based Masking Revisited
IACR Transactions on Cryptographic Hardware and Embedded Systems 2021, no. 1 (2020): 426-450.Status: Published
Redundant Code-based Masking Revisited
Masking schemes are a popular countermeasure against side-channel attacks. To mask bytes, the two classical options are Boolean masking and polynomial masking. The latter lends itself to redundant masking, where leakage emanates from more shares than are strictly necessary to reconstruct, raising the obvious question how well such “redundant” leakage can be exploited by a side-channel adversary. We revisit the recent work by Chabanne et al. (CHES’18) and show that, contrary to their conclusions, said leakage can—in theory—always be exploited. For the Hamming weight scenario in the low-noise regime, we heuristically determine how security degrades in terms of the number of redundant shares for first and second order secure polynomial masking schemes.
Furthermore, we leverage a well-established link between linear secret sharing schemes and coding theory to determine when different masking schemes will end up with essentially equivalent leakage profiles. Surprisingly, we conclude that for typical field sizes and security orders, Boolean masking is a special case of polynomial masking. We also identify quasi-Boolean masking schemes as a special class of redundant polynomial masking and point out that the popular “Frobenius-stable” sets of interpolations points typically lead to such quasi-Boolean masking schemes, with subsequent degraded leakage performance.
Afilliation | Cryptography |
Project(s) | Cryptography Section |
Publication Type | Journal Article |
Year of Publication | 2020 |
Journal | IACR Transactions on Cryptographic Hardware and Embedded Systems |
Volume | 2021 |
Issue | 1 |
Pagination | 426 - 450 |
Date Published | 12/2020 |
Publisher | Ruhr-University of Bochum |
ISSN | 2569-2925 |
Keywords | Coding Theory, Masking, Shamir Secret Sharing, Success Rate |
URL | https://tches.iacr.org/index.php/TCHES/article/view/8740 |
DOI | 10.46586/tches.v2021.i1.426-450 |
Proceedings, refereed
Vetted Encryption
In Progress in Cryptology - INDOCRYPT 2020 - 21st International Conference on Cryptology in India. Vol. 12578. Springer, 2020.Status: Published
Vetted Encryption
Afilliation | Cryptography |
Project(s) | No Simula project |
Publication Type | Proceedings, refereed |
Year of Publication | 2020 |
Conference Name | Progress in Cryptology - INDOCRYPT 2020 - 21st International Conference on Cryptology in India |
Volume | 12578 |
Pagination | 488–507 |
Publisher | Springer |
URL | https://doi.org/10.1007/978-3-030-65277-7_22 |
DOI | 10.1007/978-3-030-65277-7_22 |