Additional resources
We next provide additional resources related to the Spook authenticated encryption algorithm, in partircular references related to the design of Spook and slides from the Spook workshop that took place in July 2019.
The concept of leveled implementations was introduced in:
- O. Pereira, F.-X. Standaert, S. Vivek, Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives, in the proceedings of ACM CCS 2015, pp 96-108, Denver, Colorado, USA, October 2015 (pdf file)
The decryption-based tag verification that Spook exploits is analyzed in:
- F. Berti, O. Pereira, T. Peters, F.-X. Standaert, Leakage-Resilient Authenticated Encryption with Decryption Leakages, in IACR Transactions on Symmetric Cryptology, vol 2017, num 3, pp 271-293, (pdf file).
The definitional framework on which Spook relies can be found in:
- Chun Guo, O. Pereira, T. Peters, F.-X. Standaert, Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results & First Construction, to appear in the proceedings of LatinCrypt 2019, Lecture Notes in Computer Science, vol xxxx, pp yyy-zzz, Santiago, Chile, October 2019, Springer, (pdf file, extended version).
The LS-design strategy that our tweakable block cipher and permutation follow is described in:
- V. Grosso, G. Leurent, F.-X. Standaert, K. Varici, LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations, in the proceedings of FSE 2014, Lecture Notes in Computer Science, vol 8540, pp 18-37, London, UK, March 2014, Springer, (pdf file)
We organized a workshop related to the design and implementation of Spook in July 2019. The workshop program with presentation slides is displayed next:
- Mode of operation
- Shadow & Clyde
- Implementation issues