نتایج جستجو برای: leakage resilient

تعداد نتایج: 45562  

2015
Benjamin Fuller Ariel Hamlin

Leakage resilient cryptography designs systems to withstand partial adversary knowledge of secret state. Ideally, leakage-resilient systems withstand current and future attacks; restoring confidence in the security of implemented cryptographic systems. Understanding the relation between classes of leakage functions is an important aspect. In this work, we consider the memory leakage model, wher...

Journal: :Journal of Systems and Software 2016

Journal: :IEEE Access 2022

A multi-recipient signcryption (MRSC) scheme possesses the functionalities of both public-key encryption and digital signature to ensure integrity confidentiality transmitted messages. Moreover, an anonymous MRSC (AMRSC) retains while offering privacy-preserving, namely, a recipient’s identity or public key being hidden other recipients. In past, numerous AMRSC schemes based on various cryptogr...

Journal: :IACR Cryptology ePrint Archive 2013
Guangjun Fan Yongbin Zhou François-Xavier Standaert Dengguo Feng

Leakage resilient cryptography aims to address the issue of inadvertent and unexpected information leakages from physical cryptographic implementations. At Asiacrypt 2010, E.Kiltz et al. [1] presented a multiplicatively blinded version of ElGamal public-key encryption scheme, which is proved to be leakage resilient in the generic group model against roughly 0.50*log(p) bits of arbitrary, advers...

Journal: :IACR Cryptology ePrint Archive 2017
Jianye Huang Qiong Huang

To simplify the certificate management procedures, Shamir introduced the concept of identity-based cryptography (IBC). However, the key escrow problem is inherent in IBC. To get rid of it, Al-Riyami and Paterson introduced in 2003 the notion of certificateless cryptography (CLC). However, if a cryptosystem is not perfectly implemented, adversaries would be able to obtain part of the system's se...

2013
Guomin Yang Yi Mu Willy Susilo Duncan S. Wong

Authenticated key exchange (AKE) protocols allow two parties communicating over an insecure network to establish a common secret key. They are among the most widely used cryptographic protocols in practice. In order to resist key-leakage attacks, several leakage resilient AKE protocols have been proposed recently in the bounded leakage model. In this paper, we initiate the study on leakage resi...

Journal: :IACR Transactions on Cryptographic Hardware and Embedded Systems 2020

Journal: :IACR Cryptology ePrint Archive 2009
Joël Alwen Yevgeniy Dodis Daniel Wichs

We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject only to the constraint that the overall amount of such information is bounded by some parameter l. We construct a variety of leakage-resilient public-key systems including the first known identification schemes (ID), si...

Journal: :IACR Cryptology ePrint Archive 2012
Danyang Chen Yongbin Zhou Yang Han Rui Xue Qing He

Random extractors are proven to be important building blocks in constructing leakage resilient cryptographic primitives. Nevertheless, recent efforts showed that they are likely more leaky than other elementary components (e.g. block ciphers) in unprotected implementations of these primitives, in the context of side-channel attacks. In this context, from the adversary’s point of view, the extra...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید