Leakage-Resilient Cryptography From the Inner-Product Extractor
@article{Dziembowski2011LeakageResilientCF, title={Leakage-Resilient Cryptography From the Inner-Product Extractor}, author={Stefan Dziembowski and S. Faust}, journal={IACR Cryptol. ePrint Arch.}, year={2011}, volume={2011}, pages={519} }
We present a generic method to secure various widely-used cryptosystems against arbitrary side-channel leakage, as long as the leakage adheres three restrictions: first, it is bounded per observation but in total can be arbitrary large. Second, memory parts leak independently, and, third, the randomness that is used for certain operations comes from a simple (non-uniform) distribution.
As a fundamental building block, we construct a scheme to store a cryptographic secret such that it remains… CONTINUE READING
68 Citations
Continuous After-the-Fact Leakage-Resilient Group Password-Authenticated Key Exchange
- Computer Science
- Int. J. Netw. Secur.
- 2019
- PDF
Continuous leakage-resilient certificate-based encryption
- Mathematics, Computer Science
- Inf. Sci.
- 2016
- 32
Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice
- Mathematics, Computer Science
- ACNS
- 2015
- 2
- PDF
Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance
- Computer Science
- Secur. Commun. Networks
- 2014
- 1
Post-challenge leakage in public-key encryption
- Computer Science, Mathematics
- Theor. Comput. Sci.
- 2015
- 11
A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme
- Computer Science, Mathematics
- IMACC
- 2013
- 7
- PDF
Efficient leakage-resilient public key encryption from DDH assumption
- Computer Science
- Cluster Computing
- 2013
- 22
Bringing Theory Closer to Practice in Post-quantum and Leakage-resilient Cryptography
- Computer Science
- 2015
- PDF
Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2013
- PDF
References
SHOWING 1-10 OF 52 REFERENCES
Securing Computation against Continuous Leakage
- Mathematics, Computer Science
- CRYPTO
- 2010
- 78
- Highly Influential
- PDF
On Protecting Cryptographic Keys Against Continual Leakage
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2010
- 84
- Highly Influential
- PDF
Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage
- Computer Science
- 2010 IEEE 51st Annual Symposium on Foundations of Computer Science
- 2010
- 203
Cryptography against Continuous Memory Attacks
- Computer Science, Mathematics
- 2010 IEEE 51st Annual Symposium on Foundations of Computer Science
- 2010
- 202
- PDF
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Computer Science
- CRYPTO
- 2009
- 277
- PDF
Leakage-Resilient Cryptography
- Computer Science
- 2008 49th Annual IEEE Symposium on Foundations of Computer Science
- 2008
- 478
- PDF
Efficient Public-Key Cryptography in the Presence of Key Leakage
- Computer Science, Mathematics
- ASIACRYPT
- 2010
- 172
- PDF
Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Mathematics, Computer Science
- TCC
- 2009
- 462
- PDF