搜索结果: 1-7 共查到“军队指挥学 leakage-resilient cryptography”相关记录7条 . 查询时间(0.084 秒)
In the past 15 years, cryptography has made considerable progress in expanding the adversarial attack model to cover side-channel attacks, and has built schemes to provably defend against some of them...
Weak-Key Leakage Resilient Cryptography
weak key-leakage attacks public-key encryption scheme chosen-ciphertext security
2016/1/25
In traditional cryptography, the standard way of examining the security of a scheme is to
analyze it in a black-box manner, capturing no side channel attacks which exploit various forms
of unintende...
Leakage-Resilient Cryptography with Key Derived from Sensitive Data
leakage resilient cryptography bounded retrieval model key derivation
2016/1/3
In this paper we address the problem of large space consumption
for protocols in the Bounded Retrieval Model (BRM), which require users to
store large secret keys subject to adversarial leakage. We ...
Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice
leakage resilient LPN
2015/12/31
Information leakage is a major concern in modern day IT-security. In fact, a malicious
user is often able to extract information about private values from the computation
performed on the devices. I...
We present a generic method to secure various widely-used cryptosystems against \emph{arbitrary} side-channel leakage, as long as the leakage adheres three restrictions: first, it is bounded per obser...
Leakage Resilient Cryptography in Practice
Leakage Resilient Cryptography side-channel key recovery attacks cryptographic algorithms
2009/7/14
In this report, we are concerned with models to analyze the
security of cryptographic algorithms against side-channel attacks. Our
objectives are threefold. In a first part of the paper, we aim to s...
Leakage-Resilient Cryptography in the Standard Model
Leakage-Resilient Cryptography Standard Model
2009/6/5
We construct a stream-cipher S whose implementation is secure even if arbitrary (adversely
chosen) information on the internal state of S is leaked during computation. This
captures all possible sid...