Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
From MaRDI portal
Publication:3582746
DOI10.1007/978-3-642-14623-7_2zbMath1280.94047OpenAlexW1602503772MaRDI QIDQ3582746
Yevgeniy Dodis, Krzysztof Pietrzak
Publication date: 24 August 2010
Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_2
Related Items (16)
Leakage Resilient One-Way Functions: The Auxiliary-Input Setting ⋮ Simulating Auxiliary Inputs, Revisited ⋮ Security analysis of deterministic re-keying with masking and shuffling: application to ISAP ⋮ Rogue Decryption Failures: Reconciling AE Robustness Notions ⋮ A Leakage Resilient MAC ⋮ Strong authenticated key exchange with auxiliary inputs ⋮ Masking and leakage-resilient primitives: one, the other(s) or both? ⋮ Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF ⋮ Keymill: side-channel resilient key generator, a new concept for SCA-security by design ⋮ Leakage resilient one-way functions: the auxiliary-input setting ⋮ Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity ⋮ Locally decodable and updatable non-malleable codes and their applications ⋮ Leakage resilient value comparison with application to message authentication ⋮ Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle ⋮ Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
This page was built for publication: Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks