Filters








1,268 Hits in 2.9 sec

A Time-Success Ratio Analysis of wPRF-based Leakage-Resilient Stream Ciphers [article]

Maciej Skorski
2015 arXiv   pre-print
Weak pseudorandom functions (wPRFs) found an important application as main building blocks for leakage-resilient ciphers (EUROCRYPT'09).  ...  The aim of this paper is twofold. First, we present a clear comparison of quantitatively different security bounds in the literature.  ...  Introduction Leakage-resilient cryptography Leakage Resilience.  ... 
arXiv:1505.06765v1 fatcat:ludquy3dejfg3o7zacskftkefy

Guest Editorial

Claude Carlet, Pierre-Alain Fouque
2014 Cryptography and Communications  
In light of this, we thought that a special issue on "Side Channel Attacks and their Countermeasures" could be of interest to the cryptology community.  ...  workshops, with substantial revision and new contributions; 3. expository survey articles in relevant topics.  ...  Another one studies two different countermeasures, masking and leakage resilient scheme.  ... 
doi:10.1007/s12095-014-0115-4 fatcat:tfgx5ssh2rahvioqxpq6dclfm4

Survey: Leakage Resilience and the Bounded Retrieval Model [chapter]

Joël Alwen, Yevgeniy Dodis, Daniel Wichs
2010 Lecture Notes in Computer Science  
This survey paper studies recent advances in the field of Leakage-Resilient Cryptography.  ...  Another interesting feature of leakage-resilient cryptography is that informationtheoretic techniques are often used even in the design of computationally secure schemes, such as password authentication  ...  For example a line of work called exposure resilient cryptography [CDH + 00, DSS01] studies a restricted class of adversarial leakage functions, where the adversary gets a subset of the bits of the secret  ... 
doi:10.1007/978-3-642-14496-7_1 fatcat:4elp4b6xx5awvb4aue7wyhzwve

On Leakage-Resilient Secret Sharing [article]

Hemanta K. Maji, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang
2020 IACR Cryptology ePrint Archive  
Our understanding of the leakage-resilience of secret-sharing schemes is still in its preliminary stage. This work studies locally leakage-resilient linear secret-sharing schemes.  ...  This Monte-Carlo construction of linear secret-sharing scheme that is locally leakage-resilient has applications to leakage-resilient secure computation.  ...  Leakage resilient secret shar- KR19 Yael Tauman Kalai and Leonid Reyzin. A survey of leakage-resilient cryptography. ing and applications.  ... 
dblp:journals/iacr/MajiPSW20 fatcat:zwc3lrldbrf6bj4gqsrpbdbmey

Physical Protection of Lattice-Based Cryptography

Ayesha Khalid, Tobias Oder, Felipe Valencia, Maire O' Neill, Tim Güneysu, Francesco Regazzoni
2018 Proceedings of the 2018 on Great Lakes Symposium on VLSI - GLSVLSI '18  
We survey the state-of-the-art in terms of side channel attacks (SCA), both invasive and passive attacks, and proposed countermeasures.  ...  The impending realization of scalable quantum computers will have a significant impact on today's security infrastructure.  ...  Of the various flavors of quantum-resilient cryptography proposed to date, lattice-based cryptography (LBC) stands out for various reasons.  ... 
doi:10.1145/3194554.3194616 dblp:conf/glvlsi/KhalidOVOGR18 fatcat:lfintj5vbbf5xllxwoxeer6hdu

Leakage-resilient Attribute-based Encryption with CCA2 Security

Leyou Zhang, Yujie Shang
2019 International Journal of Network Security  
Based on this basic scheme, a λ-leakage resilient CCA2 secure ABE is proposed in the standard model.  ...  Leakage-resilient Attribute-Based Encryption (ABE) is one of efficient methods to solve the side-channel attacks.  ...  Traditional cryptography is not hard enough to resist these attacks, so leakage-resilient cryptography emerges as the times require. Recently many leakage-resilient models are proposed.  ... 
dblp:journals/ijnsec/ZhangS19 fatcat:a7kqnu45tvav3eoqekfxct3faa

A Computational Indistinguishability Logic for the Bounded Storage Model [chapter]

Gilles Barthe, Mathilde Duclos, Yassine Lakhnech
2012 Lecture Notes in Computer Science  
There are several models of leakage resilient cryptography, from very general models such as physically observable cryptography, to more specialized models that aim to account for a specific form of covert  ...  Our work provides the first formalism to reason about leakage resilient cryptography.  ...  Thus, our work constitutes the first application of CIL to a protocol, and the first formal proof of security in a model of leakage-resilient cryptography.  ... 
doi:10.1007/978-3-642-27901-0_9 fatcat:smos7wyyhzdhxhrsc3scqj3l2y

Survey on Emerging Security Mechanisms for Medical Cyber Physical Systems

Anupama C V, Misha Ravi
2017 International Journal Of Engineering And Computer Science  
Medical Cyber Physical System (MCPS) is able to transmit and process the data collected from health monitoring systems, which consists of BAN.  ...  The acquired data is transmitted to private or public cloud which contains set of algorithms for analysing the patient data. These medical data should be kept secret.  ...  Leakage Resilient Cryptography adopts a different viewpoint by trying to provide provably secure primitives in the presence of a wide range of sidechannel information.  ... 
doi:10.18535/ijecs/v6i2.06 fatcat:4gtyoa2qvvgszkog7ruleyrjri

Data Security and Privacy Protection for Cloud Storage: A Survey

Pan Yang, Neal N. Xiong, Jingli Ren
2020 IEEE Access  
Although there are some studies on data security and privacy protection, there is still a lack of systematic surveys on the subject in cloud storage system.  ...  Such a huge amount of data can create magnanimous wealth.  ...  In order to handle this situation, the concept of leakage-resilient is introduced into the cryptography scheme (for instance, [6] , [66] ).  ... 
doi:10.1109/access.2020.3009876 fatcat:6kcb3junlzhvvcq3qhztumpdqq

2020 Index IEEE Open Journal of the Computer Society Vol. 1

2020 IEEE Open Journal of the Computer Society  
., +, OJCS 2020 230-249 Public key cryptography Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage.  ...  ., +, OJCS 2020 182-192 Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage.  ... 
doi:10.1109/ojcs.2020.3047784 fatcat:r2i6j54vanczbjb5eee6mmw7qy

The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy [chapter]

Divesh Aggarwal, Ueli Maurer
2011 Lecture Notes in Computer Science  
A main result of the paper is that the leakage-resilience limit and the unpredictability entropy are equal.  ...  The leakage-resilience limit of a cryptographic assumption, and hence of a computational search problem, is the maximal number of bits of information that can be leaked (adaptively) about an instance,  ...  A survey of this can be found in Chapter 3 of [28] .  ... 
doi:10.1007/978-3-642-25385-0_37 fatcat:nadyue77o5a6hfjqf3ufdzirfq

F6: Computer Systems Under Attack - Paying the Performance Price for Protection

2022 2022 IEEE International Solid- State Circuits Conference (ISSCC)  
State of the art DARPA research aims to ease the burden of developing secure chips by creating novel, automated chip design flows that will allow security mechanisms to be automatically inserted into a  ...  Attacks on chip security are a clear and present danger.  ...  He is a co-designer of 'Saber' which is a finalist in NIST's Post-Quantum Cryptography Standardization Project.  ... 
doi:10.1109/isscc42614.2022.9731690 fatcat:lws6fjt6yrg43i6uvteou33ty4

Efficient Public-Key Cryptography in the Presence of Key Leakage [chapter]

Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs
2010 Lecture Notes in Computer Science  
Our model of leakage-resilience was recently introduced by Akavia et al. [2], but already attracted a lot of attention from the cryptographic community [48, 4, 42, 3] .  ...  In particular, as we survey later, we already know many "leakage-resilient" primitives, including such fundamental primitives as signature schemes, encryption schemes, identification (ID) schemes and authenticated  ...  For example, exposure resilient cryptography [12, 20, 41] studies the case where an adversary can only learn some small subset of the physical bits of the secret key.  ... 
doi:10.1007/978-3-642-17373-8_35 fatcat:hukm365jfvhmxabgvnja3p6dgy

Fully Homomorphic Distributed Identity-based Encryption Resilient to Continual Auxiliary Input Leakage

François Gérard, Veronika Kuchta, Rajeev Anand Sahu, Gaurav Sharma, Olivier Markowitch
2018 Proceedings of the 15th International Joint Conference on e-Business and Telecommunications  
Recently a lot of effort has been put into designing cryptosystems such that the impact of leaking key related information is minimized, this area is mostly known as leakage-resilient cryptography.  ...  History tells us that is not enough to base security solely on the unfeasability of solving the underlying hard problem of a cryptosystem.  ...  INTRODUCTION AND MOTIVATION Leakage-Resilient Cryptography.  ... 
doi:10.5220/0006832202070218 dblp:conf/icete/GerardKS0M18 fatcat:vs77pwj345fava37tuoeh33lgq

New approach to practical leakage-resilient public-key cryptography

Suvradip Chakraborty, Janaka Alawatugoda, Chandrasekaran Pandu Rangan
2019 Journal of Mathematical Cryptology  
We introduce the first-ever leakage model for LLKE protocols in the BML setting and the first construction of such a leakage-resilient LLKE from the LR-NIKE protocol.  ...  We introduce a new leakage model for AKE protocols, in the BML setting, and present a leakage-resilient AKE protocol construction from the LR-NIKE protocol.  ...  Leakage-resilient cryptography emerged as a theoretical foundation to address the issue of side-channel attacks.  ... 
doi:10.1515/jmc-2019-0014 fatcat:3q7qeb45pfaqjizpzdlhcemf2q
« Previous Showing results 1 — 15 out of 1,268 results