Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
From MaRDI portal
Publication:3563833
DOI10.1007/978-3-642-13190-5_7zbMath1279.94073OpenAlexW1563465674MaRDI QIDQ3563833
Sebastian Faust, Vinod Vaikuntanathan, Eran Tromer, Tal Rabin, Leonid Reyzin
Publication date: 1 June 2010
Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13190-5_7
Related Items (36)
Adaptive extractors and their application to leakage resilient secret sharing ⋮ Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation ⋮ How to Compute in the Presence of Leakage ⋮ Impossibility of Black-Box Simulation Against Leakage Attacks ⋮ A Leakage Resilient MAC ⋮ Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage ⋮ Fully leakage-resilient signatures ⋮ A group identification protocol with leakage resilience of secret sharing scheme ⋮ Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy ⋮ Leakage Resilience of the Blom’s Key Distribution Scheme ⋮ Short leakage resilient and non-malleable secret sharing schemes ⋮ Secure and efficient software masking on superscalar pipelined processors ⋮ Divided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacks ⋮ An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order ⋮ Unifying leakage models: from probing attacks to noisy leakage ⋮ Interleaved Group Products ⋮ Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification ⋮ Compositional Synthesis of Leakage Resilient Programs ⋮ Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience ⋮ On the Connection between Leakage Tolerance and Adaptive Security ⋮ Fully Leakage-Resilient Codes ⋮ Classical leakage resilience from fault-tolerant quantum computation ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ Efficient Leakage Resilient Circuit Compilers ⋮ On the local leakage resilience of linear secret sharing schemes ⋮ Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice ⋮ Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits ⋮ Optimal Amplification of Noisy Leakages ⋮ Unconditionally secure computation against low-complexity leakage ⋮ Polynomial Evaluation and Side Channel Analysis ⋮ Correction to: ``Unconditionally secure computation against low-complexity leakage ⋮ Locally decodable and updatable non-malleable codes and their applications ⋮ The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free ⋮ Deterministic Public-Key Encryption Under Continual Leakage ⋮ Leakage resilience from program obfuscation ⋮ Leakage-Resilient Signatures
This page was built for publication: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases