On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages
From MaRDI portal
Publication:2946470
DOI10.1007/978-3-319-16295-9_7zbMath1378.94037OpenAlexW982871588MaRDI QIDQ2946470
Fabrizio De Santis, Stefan Rass
Publication date: 17 September 2015
Published in: Progress in Cryptology - LATINCRYPT 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-16295-9_7
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Decorrelation: a theory for block cipher security
- Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions
- Leakage-Resilient Symmetric Encryption via Re-keying
- Localized Electromagnetic Analysis of Cryptographic Implementations
- Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
- How Leaky Is an Extractor?
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- A Leakage-Resilient Mode of Operation
- Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
- Practical Leakage-Resilient Symmetric Cryptography
- Foundations of Cryptography
- On cryptography with auxiliary input
- Power Analysis Attacks
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Topics in Cryptology – CT-RSA 2004
- Theory of Cryptography