Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
From MaRDI portal
Publication:5418709
DOI10.1007/978-3-642-55220-5_24zbMath1326.94086MaRDI QIDQ5418709
Stefan Dziembowski, Sebastian Faust, Alexandre Duc
Publication date: 27 May 2014
Published in: Advances in Cryptology – EUROCRYPT 2014 (Search for Journal in Brave)
Full work available at URL: https://infoscience.epfl.ch/record/198833/files/paper.pdf
Related Items
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model, How Fast Can Higher-Order Masking Be in Software?, Threshold implementations of small S-boxes, Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks, Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms, Uniform first-order threshold implementations, Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version, Locally decodable and updatable non-malleable codes and their applications, Efficient Leakage Resilient Circuit Compilers, Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks, Optimal Amplification of Noisy Leakages, Polynomial Evaluation and Side Channel Analysis, Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems, Bounded Indistinguishability and the Complexity of Recovering Secrets, Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy, A Better Chain Rule for HILL Pseudoentropy - Beyond Bounded Leakage, Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation, Impossibility of Black-Box Simulation Against Leakage Attacks, Secure Computation from Leaky Correlated Randomness, Algebraic Decomposition for Probing Security, Consolidating Masking Schemes, Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage