Recovering Secrets From Prefix-Dependent Leakage
نویسندگان
چکیده
منابع مشابه
Bounded Indistinguishability and the Complexity of Recovering Secrets
Motivated by cryptographic applications, we study the notion of bounded indistinguishability, a natural relaxation of the well studied notion of bounded independence. We say that two distributions μ and ν over Σ are k-wise indistinguishable if their projections to any k symbols are identical. We say that a function f : Σ → {0, 1} is -fooled by k-wise indistinguishability if f cannot distinguish...
متن کاملDABLS: Device Attestation with Bounded Leakage of Secrets
Use of commodity platforms for embedded systems makes it difficult to authenticate remote devices in the presence of malware and to obtain confirmation of malware-free device states in a verifiable manner. We propose a scheme for achieving these properties by installing and maintaining a pool of secrets in device memory that cannot be leaked by malware in its entirety via a bandwidth-limited (e...
متن کاملModeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange
Recent advances in the design and analysis of secure two-party key exchange (2KE) such as the leakage of ephemeral secrets used during the attacked sessions remained unnoticed by the current models for group key exchange (GKE). Focusing on a special case of GKE — the tripartite key exchange (3KE) — that allows for efficient one-round protocols, we demonstrate how to incorporate these advances t...
متن کاملReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets
Many commodity operating systems and applications become infested with malicious software over time, primarily due to exploits that take advantage of software flaws and operator errors. In this paper, we present the salient features of a system design which allows remote-device authentication by a verifier, reaching malware-free system states, and trusted application booting in the presence of ...
متن کاملRecovering position-dependent diffusion from biased molecular dynamics simulations.
All atom molecular dynamics (MD) models provide valuable insight into the dynamics of biophysical systems, but are limited in size or length by the high computational demands. The latter can be reduced by simulating long term diffusive dynamics (also known as Langevin dynamics or Brownian motion) of the most interesting and important user-defined parts of the studied system, termed collective v...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Mathematical Cryptology
سال: 2020
ISSN: 1862-2984,1862-2976
DOI: 10.1515/jmc-2015-0048