• Publications
  • Influence
Proofs of Space
Proofs of work (PoW) have been suggested by Dwork and Naor (Crypto’92) as protection to a shared resource. The basic idea is to ask the service requestor to dedicate some non-trivial amount ofExpand
  • 185
  • 14
  • PDF
Continuous Non-malleable Codes
TLDR
Non-malleable codes are a natural relaxation of error correcting/ detecting codes that have useful applications in the context of tamper resilient cryptography. Expand
  • 101
  • 9
  • PDF
Leakage-Resilient Cryptography From the Inner-Product Extractor
TLDR
We present a generic method to secure various widely-used cryptosystems against arbitrary side-channel leakage, as long as the leakage adheres three restrictions: first, it is bounded per observation but in total can be arbitrary large. Expand
  • 67
  • 8
  • PDF
Inner Product Masking Revisited
Masking is a popular countermeasure against side channel attacks. Many practical works use Boolean masking because of its simplicity, ease of implementation and comparably low performance overhead.Expand
  • 30
  • 8
  • PDF
Leakage-Resilient Signatures
TLDR
The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. Expand
  • 131
  • 7
  • PDF
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
TLDR
We present a general transformation that compiles any circuit into a new, functionally equivalent circuit which is resilient against well-defined classes of leakage. Expand
  • 138
  • 7
  • PDF
Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device
TLDR
We investigate the relationships between theoretical studies of leaking cryptographic devices and concrete security evaluations with standard side-channel attacks, and show that it can be predicted based on the mutual information metric. Expand
  • 116
  • 7
  • PDF
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits
TLDR
We show that for any polynomial bound s given a-priori, there is an efficient non-malleable code that protects against all tampering functions f computable by a circuit of size s. Expand
  • 73
  • 7
  • PDF
On the Non-malleability of the Fiat-Shamir Transform
TLDR
We formally define simulation soundness and a weak form of simulation extraction in the random oracle model (ROM). Expand
  • 84
  • 7
  • PDF
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
TLDR
In this paper, we provide a necessary clarification of the good security properties that can be obtained from parallel implementations of masking schemes and improve security against multivariate side-channel attacks. Expand
  • 70
  • 7
  • PDF