نتایج جستجو برای: leakage resilient

تعداد نتایج: 45562  

2014
Kaoru Kurosawa Trieu Phong

While the hybrid public key encryption scheme of Kurosawa and Desmedt (CRYPTO 2004) is provably secure against chosen ciphertext attacks (namely, IND-CCA-secure), its associated key encapsulation mechanism (KEM) is widely known as not IND-CCA-secure. In this paper, we present a direct proof of IND-CCA security thanks to a simple twist on the Kurosawa-Desmedt KEM. Our KEM beats the standardized ...

Journal: :Cryptography 2022

We propose cryptographic rational secret sharing protocols over general networks. In a network, the dealer may not have direct connections to each player, and players of other players. present conditions on network topology for which our proposed are computational strict Nash equilibria (k−1)-resilient, along with analysis their round communication complexity. also new notions such as Φ-resilie...

Journal: :international journal of transportation engineering 0
hasan taherkhani assistant professor, department of civil engineering, zanjan university, zanjan, iran fereydoon moghadas nejad associate professor, department of civil and environmental engineering, amirkabir industrial university, tehran, iran ali khodaii associate professor, department of civil and environmental engineering, amirkabir industrial university, tehran, iran arash saleh ahari msc. student, department of civil engineering, zanjan university, zanjan, iran

resilient modulus of pavement materials is a key property required for the pavement thickness design. this paper describes the results of an experimental study on the effects of temperature and loading frequency on the resilient modulus of a sbs polymer modified asphalt concrete under dry and saturated conditions. dynamic creep tests were conducted on dry and saturated specimens of the mixture ...

2010
Nicolas Veyrat-Charvillon François-Xavier Standaert

Most side-channel attacks that have been published in the open literature assume knownor chosen-message adversarial scenarios. In this paper, we analyze the increase of the attacks’ efficiencies that can be obtained by adaptively selecting the messages. For this purpose, we first describe a generic strategy that allows an adversary to take advantage of this capability. We show that it can be ap...

2015
Krzysztof Pietrzak Maciej Skorski

Computational notions of entropy (a.k.a. pseudoentropy) have found many applications, including leakage-resilient cryptography, deterministic encryption or memory delegation. The most important tools to argue about pseudoentropy are chain rules, which quantify by how much (in terms of quantity and quality) the pseudoentropy of a given random variable X decreases when conditioned on some other v...

2012
François-Xavier Standaert Christophe Petit Nicolas Veyrat-Charvillon

We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the intersection between One-Time Programs and Boolean masking schemes. First, we show that this countermeasure prevents side-channel attacks of all orders during the execution of a protected block cipher implementation, given that some secure precomputations can be performed. Second, we show that taking...

2014
Prabhanjan Vijendra Ananth Vipul Goyal Omkant Pandey

We consider the task of constructing interactive proofs for NP which can provide meaningful security for a prover even in the presence of continual memory leakage. We imagine a setting where an adversarial verifier participates in multiple sequential interactive proof executions for a fixed NP statement x. In every execution, the adversarial verifier is additionally allowed to leak a fraction o...

2010
Kimmo Järvinen Vladimir Kolesnikov Ahmad-Reza Sadeghi Thomas Schneider

The power of side-channel leakage attacks on cryptographic implementations is evident. Today’s practical defenses are typically attackspecific countermeasures against certain classes of side-channel attacks. The demand for a more general solution has given rise to the recent theoretical research that aims to build provably leakage-resilient cryptography. This direction is, however, very new and...

2009
Joël Alwen Yevgeniy Dodis Daniel Wichs

This survey paper studies recent advances in the field of LeakageResilient Cryptography. This booming area is concerned with the design of cryptographic primitives resistant to arbitrary side-channel attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject only to the constraint that the overall amount of such information is bounded by some parame...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید