Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks
From MaRDI portal
Publication:2794524
DOI10.1007/978-3-319-28166-7_31zbMath1423.94044OpenAlexW2406784298WikidataQ56920959 ScholiaQ56920959MaRDI QIDQ2794524
Damien Vergnaud, Michel Abdalla, Sylvain Ruhault, David Pointcheval, Sonia Belaïd
Publication date: 10 March 2016
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-28166-7_31
Shift register sequences and sequences over finite alphabets in information and communication theory (94A55) Cryptography (94A60)
Related Items
A brief and understandable guide to pseudo-random number generators and specific models for security, Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks
Cites Work
- Unnamed Item
- Masking and leakage-resilient primitives: one, the other(s) or both?
- Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks
- Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions
- Leakage-Resilient Symmetric Encryption via Re-keying
- How to Eat Your Entropy and Have It Too – Optimal Recovery Strategies for Compromised RNGs
- Soft Analytical Side-Channel Attacks
- Biclique Cryptanalysis of the Full AES
- Leakage-Resilient Signatures
- A Leakage-Resilient Mode of Operation
- Practical Leakage-Resilient Symmetric Cryptography
- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness
- Masking against Side-Channel Attacks: A Formal Security Proof
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
- Public Key Cryptography - PKC 2005
- Theory of Cryptography