搜索结果: 1-7 共查到“军队指挥学 Leakage-resilient cryptography”相关记录7条 . 查询时间(0.062 秒)
A Survey of Leakage-Resilient Cryptography
Leakage-resilience side channel attacks
font style='font-size:12px;'>
2019/3/21
In the past 15 years, cryptography has made considerable progress in expanding the adversarial attack model to cover side-channel attacks, and has built schemes to provably defend against some of them...
Weak-Key Leakage Resilient Cryptography
weak key-leakage attacks public-key encryption scheme chosen-ciphertext security
font style='font-size:12px;'>
2016/1/25
In traditional cryptography, the standard way of examining the security of a scheme is to
analyze it in a black-box manner, capturing no side channel attacks which exploit various forms
of unintende...
Leakage-Resilient Cryptography with Key Derived from Sensitive Data
leakage resilient cryptography bounded retrieval model key derivation
font style='font-size:12px;'>
2016/1/3
In this paper we address the problem of large space consumption
for protocols in the Bounded Retrieval Model (BRM), which require users to
store large secret keys subject to adversarial leakage. We ...
Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice
leakage resilient LPN
font style='font-size:12px;'>
2015/12/31
Information leakage is a major concern in modern day IT-security. In fact, a malicious
user is often able to extract information about private values from the computation
performed on the devices. I...
Leakage-Resilient Cryptography From the Inner-Product Extractor
foundations
font style='font-size:12px;'>
2012/3/26
We present a generic method to secure various widely-used cryptosystems against \emph{arbitrary} side-channel leakage, as long as the leakage adheres three restrictions: first, it is bounded per obser...
Leakage Resilient Cryptography in Practice
Leakage Resilient Cryptography side-channel key recovery attacks cryptographic algorithms
font style='font-size:12px;'>
2009/7/14
In this report, we are concerned with models to analyze the
security of cryptographic algorithms against side-channel attacks. Our
objectives are threefold. In a first part of the paper, we aim to s...
Leakage-Resilient Cryptography in the Standard Model
Leakage-Resilient Cryptography Standard Model
font style='font-size:12px;'>
2009/6/5
We construct a stream-cipher S whose implementation is secure even if arbitrary (adversely
chosen) information on the internal state of S is leaked during computation. This
captures all possible sid...