Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions
From MaRDI portal
Publication:2845681
DOI10.1007/978-3-642-40041-4_19zbMath1306.94090OpenAlexW1495065856MaRDI QIDQ2845681
Yu Yu, Olivier Pereira, François-Xavier Standaert
Publication date: 2 September 2013
Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-40041-4_19
Related Items (17)
Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security ⋮ \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption ⋮ A Leakage Resilient MAC ⋮ Survey of information security ⋮ On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages ⋮ Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy ⋮ Masking and leakage-resilient primitives: one, the other(s) or both? ⋮ Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF ⋮ A modular approach to the incompressibility of block-cipher-based AEADs ⋮ Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms ⋮ Unifying leakage models: from probing attacks to noisy leakage ⋮ Classical leakage resilience from fault-tolerant quantum computation ⋮ Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ Leakage resilient value comparison with application to message authentication ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle ⋮ Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
This page was built for publication: Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions