Recovering Secrets From Prefix-Dependent Leakage

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bounded Indistinguishability and the Complexity of Recovering Secrets

Motivated by cryptographic applications, we study the notion of bounded indistinguishability, a natural relaxation of the well studied notion of bounded independence. We say that two distributions μ and ν over Σ are k-wise indistinguishable if their projections to any k symbols are identical. We say that a function f : Σ → {0, 1} is -fooled by k-wise indistinguishability if f cannot distinguish...

متن کامل

DABLS: Device Attestation with Bounded Leakage of Secrets

Use of commodity platforms for embedded systems makes it difficult to authenticate remote devices in the presence of malware and to obtain confirmation of malware-free device states in a verifiable manner. We propose a scheme for achieving these properties by installing and maintaining a pool of secrets in device memory that cannot be leaked by malware in its entirety via a bandwidth-limited (e...

متن کامل

Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange

Recent advances in the design and analysis of secure two-party key exchange (2KE) such as the leakage of ephemeral secrets used during the attacked sessions remained unnoticed by the current models for group key exchange (GKE). Focusing on a special case of GKE — the tripartite key exchange (3KE) — that allows for efficient one-round protocols, we demonstrate how to incorporate these advances t...

متن کامل

ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets

Many commodity operating systems and applications become infested with malicious software over time, primarily due to exploits that take advantage of software flaws and operator errors. In this paper, we present the salient features of a system design which allows remote-device authentication by a verifier, reaching malware-free system states, and trusted application booting in the presence of ...

متن کامل

Recovering position-dependent diffusion from biased molecular dynamics simulations.

All atom molecular dynamics (MD) models provide valuable insight into the dynamics of biophysical systems, but are limited in size or length by the high computational demands. The latter can be reduced by simulating long term diffusive dynamics (also known as Langevin dynamics or Brownian motion) of the most interesting and important user-defined parts of the studied system, termed collective v...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Mathematical Cryptology

سال: 2020

ISSN: 1862-2984,1862-2976

DOI: 10.1515/jmc-2015-0048