A Leakage Resilient MAC
From MaRDI portal
Publication:3460113
DOI10.1007/978-3-319-27239-9_18zbMath1376.94039OpenAlexW2398157180MaRDI QIDQ3460113
Marcin Wójcik, Daniel P. Martin, Elisabeth Oswald, Martijn Stam
Publication date: 12 January 2016
Published in: Cryptography and Coding (Search for Journal in Brave)
Full work available at URL: https://eprint.iacr.org/2013/292
Related Items (3)
Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions ⋮ Efficient leakage-resilient MACs without idealized assumptions ⋮ Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Pairings for cryptographers
- The Weil pairing, and its efficient calculation
- Complexity of a determinate algorithm for the discrete logarithm
- Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions
- Leakage-Resilient Symmetric Encryption via Re-keying
- Indifferentiable Hashing to Barreto–Naehrig Curves
- Simulatable Leakage: Analysis, Pitfalls, and New Constructions
- A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices
- Leakage Resilient ElGamal Encryption
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- A Practical Leakage-Resilient Signature Scheme in the Generic Group Model
- Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
- Exponentiation in Pairing-Friendly Groups Using Homomorphisms
- Practical Leakage-Resilient Symmetric Cryptography
- Leakage-Resilient Cryptography from Minimal Assumptions
- Power Analysis Attacks
- Pairing-Friendly Elliptic Curves of Prime Order
- Cryptography and Coding
- Theory of Cryptography
This page was built for publication: A Leakage Resilient MAC