Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases

From MaRDI portal
Publication:3563833

DOI10.1007/978-3-642-13190-5_7zbMath1279.94073OpenAlexW1563465674MaRDI QIDQ3563833

Sebastian Faust, Vinod Vaikuntanathan, Eran Tromer, Tal Rabin, Leonid Reyzin

Publication date: 1 June 2010

Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13190-5_7




Related Items (36)

Adaptive extractors and their application to leakage resilient secret sharingMind Your Coins: Fully Leakage-Resilient Signatures with Graceful DegradationHow to Compute in the Presence of LeakageImpossibility of Black-Box Simulation Against Leakage AttacksA Leakage Resilient MACLeakage-Resilient Identification Schemes from Zero-Knowledge Proofs of StorageFully leakage-resilient signaturesA group identification protocol with leakage resilience of secret sharing schemeUnifying Leakage Classes: Simulatable Leakage and PseudoentropyLeakage Resilience of the Blom’s Key Distribution SchemeShort leakage resilient and non-malleable secret sharing schemesSecure and efficient software masking on superscalar pipelined processorsDivided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacksAn Efficient Side-Channel Protected AES Implementation with Arbitrary Protection OrderUnifying leakage models: from probing attacks to noisy leakageInterleaved Group ProductsExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationCompositional Synthesis of Leakage Resilient ProgramsTamper-Proof Circuits: How to Trade Leakage for Tamper-ResilienceOn the Connection between Leakage Tolerance and Adaptive SecurityFully Leakage-Resilient CodesClassical leakage resilience from fault-tolerant quantum computationMaking masking security proofs concrete (or how to evaluate the security of any leaking device), extended versionEfficient Leakage Resilient Circuit CompilersOn the local leakage resilience of linear secret sharing schemesLeakage-Resilient Cryptography over Large Finite Fields: Theory and PracticeMaking the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient CircuitsOptimal Amplification of Noisy LeakagesUnconditionally secure computation against low-complexity leakagePolynomial Evaluation and Side Channel AnalysisCorrection to: ``Unconditionally secure computation against low-complexity leakageLocally decodable and updatable non-malleable codes and their applicationsThe mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for freeDeterministic Public-Key Encryption Under Continual LeakageLeakage resilience from program obfuscationLeakage-Resilient Signatures




This page was built for publication: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases