Simulatable Leakage: Analysis, Pitfalls, and New Constructions
From MaRDI portal
Publication:2938847
DOI10.1007/978-3-662-45611-8_12zbMath1306.94073OpenAlexW2157641466MaRDI QIDQ2938847
Elisabeth Oswald, Michael Tunstall, Jake Longo, Daniel R. Page, Martijn Stam, Daniel P. Martin
Publication date: 16 January 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-45611-8_12
Related Items (8)
\textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption ⋮ A Leakage Resilient MAC ⋮ Survey of information security ⋮ Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy ⋮ A modular approach to the incompressibility of block-cipher-based AEADs ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle ⋮ Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
This page was built for publication: Simulatable Leakage: Analysis, Pitfalls, and New Constructions