Optimal Amplification of Noisy Leakages
From MaRDI portal
Publication:2799099
DOI10.1007/978-3-662-49099-0_11zbMath1382.94100OpenAlexW2293533774MaRDI QIDQ2799099
Stefan Dziembowski, Maciej Skórski, Sebastian Faust
Publication date: 8 April 2016
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-49099-0_11
Related Items (4)
Effective and efficient masking with low noise using small-Mersenne-prime ciphers ⋮ A Better Chain Rule for HILL Pseudoentropy - Beyond Bounded Leakage ⋮ Removing the field size loss from Duc et al.'s conjectured bound for masked encodings ⋮ Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model
Cites Work
- Unnamed Item
- Leakage-Resilient Circuits without Computational Assumptions
- Making Masking Security Proofs Concrete
- Noisy Leakage Revisited
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Three XOR-Lemmas — An Exposition
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- Leakage-Resilient Storage
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Indistinguishability Amplification
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- A Generalisation of the Theorem of Cauchy and Davenport
- Masking against Side-Channel Attacks: A Formal Security Proof
- Towards sound approaches to counteract power-analysis attacks
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
- Advances in Cryptology - CRYPTO 2003
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
This page was built for publication: Optimal Amplification of Noisy Leakages