Practical leakage-resilient pseudorandom generators

@inproceedings{Yu2010PracticalLP,
  title={Practical leakage-resilient pseudorandom generators},
  author={Yu Yu and F. Standaert and O. Pereira and M. Yung},
  booktitle={CCS '10},
  year={2010}
}
  • Yu Yu, F. Standaert, +1 author M. Yung
  • Published in CCS '10 2010
  • Computer Science
  • Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic functions is a good source of randomness, and for efficiency, the primitive of pseudorandom generator (PRG). PRG can also be used in the design of stream ciphers, for secure communications. The Internet is nowadays composed of many types of devices with very different hardware and software characteristics. Hence, one of the… CONTINUE READING
    Leakage-resilient Stream Ciphers: an Overview
    Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions
    59
    Masking and leakage-resilient primitives: One, the other(s) or both?
    40

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 50 REFERENCES
    Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
    67
    Public-Key Cryptosystems Resilient to Key Leakage
    172
    A Leakage-Resilient Mode of Operation
    239
    Leakage-Resilient Cryptography
    467
    Simultaneous Hardcore Bits and Cryptography against Memory Attacks
    449
    Algebraic Side-Channel Attacks
    120
    Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
    270
    How Leaky Is an Extractor?
    20