Practical Leakage-Resilient Symmetric Cryptography
From MaRDI portal
Publication:4649778
DOI10.1007/978-3-642-33027-8_13zbMath1366.94490OpenAlexW4186701MaRDI QIDQ4649778
Sebastian Faust, Joachim Schipper, Krzysztof Pietrzak
Publication date: 13 November 2012
Published in: Cryptographic Hardware and Embedded Systems – CHES 2012 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-33027-8_13
Related Items (13)
Simulating Auxiliary Inputs, Revisited ⋮ Security analysis of deterministic re-keying with masking and shuffling: application to ISAP ⋮ A Leakage Resilient MAC ⋮ Strong authenticated key exchange with auxiliary inputs ⋮ On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages ⋮ Masking and leakage-resilient primitives: one, the other(s) or both? ⋮ A Better Chain Rule for HILL Pseudoentropy - Beyond Bounded Leakage ⋮ Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF ⋮ Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks ⋮ On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives ⋮ Leakage resilient value comparison with application to message authentication ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle ⋮ Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions
This page was built for publication: Practical Leakage-Resilient Symmetric Cryptography