Introduction to differential power analysis

P Kocher, J Jaffe, B Jun, P Rohatgi - Journal of Cryptographic Engineering, 2011 - Springer
The power consumed by a circuit varies according to the activity of its individual transistors
and other components. As a result, measurements of the power used by actual computers or …

Masking against side-channel attacks: A formal security proof

E Prouff, M Rivain - Annual International Conference on the Theory and …, 2013 - Springer
Masking is a well-known countermeasure to protect block cipher implementations against
side-channel attacks. The principle is to randomly split every sensitive intermediate variable …

Public-key cryptosystems resilient to key leakage

M Naor, G Segev - Advances in Cryptology-CRYPTO 2009: 29th Annual …, 2009 - Springer
Most of the work in the analysis of cryptographic schemes is concentrated in abstract
adversarial models that do not capture side-channel attacks. Such attacks exploit various …

Non-malleable codes

S Dziembowski, K Pietrzak, D Wichs - Journal of the ACM (JACM), 2018 - dl.acm.org
We introduce the notion of “non-malleable codes” which relaxes the notion of error
correction and error detection. Informally, a code is non-malleable if the message contained …

Cryptography against continuous memory attacks

Y Dodis, K Haralambiev, A López-Alt… - 2010 IEEE 51st …, 2010 - ieeexplore.ieee.org
We say that a cryptographic scheme is Continuous Leakage-Resilient (CLR), if it allows
users to refresh their secret keys, using only fresh local randomness, such that: 1. The …

Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage

Z Brakerski, YT Kalai, J Katz… - 2010 IEEE 51st …, 2010 - ieeexplore.ieee.org
In recent years, there has been a major effort to design cryptographic schemes that remain
secure even when arbitrary information about the secret key is leaked (eg, via side-channel …

A leakage-resilient mode of operation

K Pietrzak - Annual International Conference on the Theory and …, 2009 - Springer
A weak pseudorandom function (wPRF) is a cryptographic primitive similar to–but weaker
than–a pseudorandom function: for wPRFs one only requires that the output is …

Public-key encryption in the bounded-retrieval model

J Alwen, Y Dodis, M Naor, G Segev, S Walfish… - Advances in Cryptology …, 2010 - Springer
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM),
providing security against various forms of adversarial “key leakage” attacks. In this model …

Signature schemes with bounded leakage resilience

J Katz, V Vaikuntanathan - International Conference on the Theory and …, 2009 - Springer
A leakage-resilient cryptosystem remains secure even if arbitrary, but bounded, information
about the secret key (and possibly other internal state information) is leaked to an adversary …

Mode-level vs. implementation-level physical security in symmetric cryptography: a practical guide through the leakage-resistance jungle

D Bellizia, O Bronchain, G Cassiers, V Grosso… - Advances in Cryptology …, 2020 - Springer
Triggered by the increasing deployment of embedded cryptographic devices (eg, for the
IoT), the design of authentication, encryption and authenticated encryption schemes …