A Leakage-Resilient Mode of Operation
From MaRDI portal
Publication:3627451
DOI10.1007/978-3-642-01001-9_27zbMath1239.94062OpenAlexW1573157032MaRDI QIDQ3627451
Publication date: 12 May 2009
Published in: Advances in Cryptology - EUROCRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-01001-9_27
Related Items (42)
Signature schemes secure against hard-to-invert leakage ⋮ How to Compute in the Presence of Leakage ⋮ A Practical Leakage-Resilient Signature Scheme in the Generic Group Model ⋮ Leakage-resilient cryptography from minimal assumptions ⋮ Leakage Resilient One-Way Functions: The Auxiliary-Input Setting ⋮ Simulating Auxiliary Inputs, Revisited ⋮ Pseudoentropy: Lower-Bounds for Chain Rules and Transformations ⋮ Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience ⋮ Another step towards realizing random oracles: non-malleable point obfuscation ⋮ Fully leakage-resilient signatures ⋮ Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions ⋮ Beyond-birthday security for permutation-based Feistel networks ⋮ Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks ⋮ The Chain Rule for HILL Pseudoentropy, Revisited ⋮ On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages ⋮ Near Collision Attack on the Grain v1 Stream Cipher ⋮ Leakage Resilience of the Blom’s Key Distribution Scheme ⋮ On the leakage-resilient key exchange ⋮ Masking and leakage-resilient primitives: one, the other(s) or both? ⋮ A Better Chain Rule for HILL Pseudoentropy - Beyond Bounded Leakage ⋮ A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model ⋮ On differential privacy and adaptive data analysis with bounded space ⋮ A modular approach to the incompressibility of block-cipher-based AEADs ⋮ Lockable obfuscation from circularly insecure fully homomorphic encryption ⋮ Trojan-resilience without cryptography ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation ⋮ On the Complexity of Breaking Pseudoentropy ⋮ On the Connection between Leakage Tolerance and Adaptive Security ⋮ Post-challenge leakage in public-key encryption ⋮ (In)security of ring-LWE under partial key exposure ⋮ Towards a ring analogue of the leftover hash lemma ⋮ Leakage resilient one-way functions: the auxiliary-input setting ⋮ Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks ⋮ A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks ⋮ Locally decodable and updatable non-malleable codes and their applications ⋮ Leakage resilient value comparison with application to message authentication ⋮ Adventures in crypto dark matter: attacks and fixes for weak pseudorandom functions ⋮ Big-Key Symmetric Encryption: Resisting Key Exfiltration ⋮ Leakage-Resilient Signatures ⋮ Public-Key Encryption Schemes with Auxiliary Inputs ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle ⋮ Leakage-resilient key exchange and two-seed extractors
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A uniform-complexity treatment of encryption and zero-knowledge
- Constructing locally computable extractors and cryptosystems in the bounded-storage model
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- How to Protect Yourself without Perfect Shredding
- Algebraic and Slide Attacks on KeeLoq
- Private Circuits II: Keeping Secrets in Tamperable Circuits
- Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
- One-Time Programs
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- A Pseudorandom Generator from any One-way Function
- Advances in Cryptology - EUROCRYPT 2004
- Probability Inequalities for Sums of Bounded Random Variables
- Advances in Cryptology - CRYPTO 2003
- Range Extension for Weak PRFs; The Good, the Bad, and the Ugly
- On Seed-Incompressible Functions
- A Practical Attack on KeeLoq
- On Forward-Secure Storage
- Theory of Cryptography
- Theory of Cryptography
- Approximation, Randomization, and Combinatorial Optimization.. Algorithms and Techniques
- Theory of Cryptography
This page was built for publication: A Leakage-Resilient Mode of Operation