Leakage-Resilient Cryptography

@article{Dziembowski2008LeakageResilientC,
  title={Leakage-Resilient Cryptography},
  author={Stefan Dziembowski and K. Pietrzak},
  journal={2008 49th Annual IEEE Symposium on Foundations of Computer Science},
  year={2008},
  pages={293-302}
}
  • Stefan Dziembowski, K. Pietrzak
  • Published 2008
  • Computer Science
  • 2008 49th Annual IEEE Symposium on Foundations of Computer Science
  • We construct a stream-cipher S whose implementation is secure even if a bounded amount of arbitrary (adversarially chosen) information on the internal state ofS is leaked during computation. This captures all possible side-channel attacks on S where the amount of information leaked in a given period is bounded, but overall can be arbitrary large. The only other assumption we make on the implementation of S is that only data that is accessed during computation leaks information. The stream… CONTINUE READING
    478 Citations
    Key-Evolution Schemes Resilient to Space-Bounded Leakage
    • 37
    • PDF
    On Protecting Cryptographic Keys Against Continual Leakage
    • 84
    • PDF
    One-Time Computable Self-erasing Functions
    • 43
    • PDF
    Multiparty computation secure against continual memory leakage
    • 45
    • PDF
    Cryptography against Continuous Memory Attacks
    • 202
    • PDF
    Parallel Repetition for Leakage Resilience Amplification Revisited
    • 7
    • PDF
    Leakage-Resilient Cryptography From the Inner-Product Extractor
    • 68
    • PDF

    References

    SHOWING 1-10 OF 50 REFERENCES
    Leakage-Resilient Cryptography in the Standard Model
    • 11
    • PDF
    Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
    • 277
    • Highly Influential
    • PDF
    Exposure-Resilient Functions and All-or-Nothing Transforms
    • 198
    • PDF
    Intrusion-Resilient Secret Sharing
    • 110
    • PDF
    On Forward-Secure Storage
    • 34
    • PDF
    A Block Cipher based PRNG Secure Against Side-Channel Key Recovery
    • 20
    • PDF
    A Provably-Secure Strongly-Randomized Cipher
    • U. Maurer
    • Mathematics, Computer Science
    • EUROCRYPT
    • 1990
    • 44
    • PDF
    A block cipher based pseudo random number generator secure against side-channel key recovery
    • 85
    • PDF
    Private Circuits II: Keeping Secrets in Tamperable Circuits
    • 162
    • PDF