A Leakage-Resilient Mode of Operation

From MaRDI portal
Publication:3627451

DOI10.1007/978-3-642-01001-9_27zbMath1239.94062OpenAlexW1573157032MaRDI QIDQ3627451

Krzysztof Pietrzak

Publication date: 12 May 2009

Published in: Advances in Cryptology - EUROCRYPT 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-01001-9_27




Related Items (42)

Signature schemes secure against hard-to-invert leakageHow to Compute in the Presence of LeakageA Practical Leakage-Resilient Signature Scheme in the Generic Group ModelLeakage-resilient cryptography from minimal assumptionsLeakage Resilient One-Way Functions: The Auxiliary-Input SettingSimulating Auxiliary Inputs, RevisitedPseudoentropy: Lower-Bounds for Chain Rules and TransformationsAdaptive-secure identity-based inner-product functional encryption and its leakage-resilienceAnother step towards realizing random oracles: non-malleable point obfuscationFully leakage-resilient signaturesAdventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functionsBeyond-birthday security for permutation-based Feistel networksPublic-key encryption for protecting data in cloud system with intelligent agents against side-channel attacksThe Chain Rule for HILL Pseudoentropy, RevisitedOn Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert LeakagesNear Collision Attack on the Grain v1 Stream CipherLeakage Resilience of the Blom’s Key Distribution SchemeOn the leakage-resilient key exchangeMasking and leakage-resilient primitives: one, the other(s) or both?A Better Chain Rule for HILL Pseudoentropy - Beyond Bounded LeakageA Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage ModelOn differential privacy and adaptive data analysis with bounded spaceA modular approach to the incompressibility of block-cipher-based AEADsLockable obfuscation from circularly insecure fully homomorphic encryptionTrojan-resilience without cryptographyLeakage-resilient cryptography from puncturable primitives and obfuscationOn the Complexity of Breaking PseudoentropyOn the Connection between Leakage Tolerance and Adaptive SecurityPost-challenge leakage in public-key encryption(In)security of ring-LWE under partial key exposureTowards a ring analogue of the leftover hash lemmaLeakage resilient one-way functions: the auxiliary-input settingRobust Pseudo-Random Number Generators with Input Secure Against Side-Channel AttacksA Unified Framework for the Analysis of Side-Channel Key Recovery AttacksLocally decodable and updatable non-malleable codes and their applicationsLeakage resilient value comparison with application to message authenticationAdventures in crypto dark matter: attacks and fixes for weak pseudorandom functionsBig-Key Symmetric Encryption: Resisting Key ExfiltrationLeakage-Resilient SignaturesPublic-Key Encryption Schemes with Auxiliary InputsMode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungleLeakage-resilient key exchange and two-seed extractors



Cites Work


This page was built for publication: A Leakage-Resilient Mode of Operation