On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives
From MaRDI portal
Publication:726335
DOI10.1016/j.ins.2014.02.149zbMath1341.94017OpenAlexW2118170046MaRDI QIDQ726335
Rui Xue, Yongbin Zhou, Qing He, Danyang Chen, Yang Han
Publication date: 8 July 2016
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2014.02.149
side-channel attackcryptographic instantiationleakage resiliencemasking and shufflingrandom extractor
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Signatures Resilient to Continual Leakage on Memory and Computation
- After-the-Fact Leakage in Public-Key Encryption
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- How Leaky Is an Extractor?
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Practical Leakage-Resilient Symmetric Cryptography
- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness
- Generic Side-Channel Distinguishers: Improvements and Limitations
- Power Analysis Attacks
- Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
- Template Attacks on Masking—Resistance Is Futile
- Applied Cryptography and Network Security
- Theory of Cryptography
This page was built for publication: On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives