Introduction to differential power analysis
P Kocher, J Jaffe, B Jun, P Rohatgi - Journal of Cryptographic Engineering, 2011 - Springer
The power consumed by a circuit varies according to the activity of its individual transistors
and other components. As a result, measurements of the power used by actual computers or …
and other components. As a result, measurements of the power used by actual computers or …
Masking against side-channel attacks: A formal security proof
Masking is a well-known countermeasure to protect block cipher implementations against
side-channel attacks. The principle is to randomly split every sensitive intermediate variable …
side-channel attacks. The principle is to randomly split every sensitive intermediate variable …
Public-key cryptosystems resilient to key leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract
adversarial models that do not capture side-channel attacks. Such attacks exploit various …
adversarial models that do not capture side-channel attacks. Such attacks exploit various …
Non-malleable codes
We introduce the notion of “non-malleable codes” which relaxes the notion of error
correction and error detection. Informally, a code is non-malleable if the message contained …
correction and error detection. Informally, a code is non-malleable if the message contained …
Cryptography against continuous memory attacks
Y Dodis, K Haralambiev, A López-Alt… - 2010 IEEE 51st …, 2010 - ieeexplore.ieee.org
We say that a cryptographic scheme is Continuous Leakage-Resilient (CLR), if it allows
users to refresh their secret keys, using only fresh local randomness, such that: 1. The …
users to refresh their secret keys, using only fresh local randomness, such that: 1. The …
Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage
In recent years, there has been a major effort to design cryptographic schemes that remain
secure even when arbitrary information about the secret key is leaked (eg, via side-channel …
secure even when arbitrary information about the secret key is leaked (eg, via side-channel …
A leakage-resilient mode of operation
K Pietrzak - Annual International Conference on the Theory and …, 2009 - Springer
A weak pseudorandom function (wPRF) is a cryptographic primitive similar to–but weaker
than–a pseudorandom function: for wPRFs one only requires that the output is …
than–a pseudorandom function: for wPRFs one only requires that the output is …
Public-key encryption in the bounded-retrieval model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM),
providing security against various forms of adversarial “key leakage” attacks. In this model …
providing security against various forms of adversarial “key leakage” attacks. In this model …
Signature schemes with bounded leakage resilience
J Katz, V Vaikuntanathan - International Conference on the Theory and …, 2009 - Springer
A leakage-resilient cryptosystem remains secure even if arbitrary, but bounded, information
about the secret key (and possibly other internal state information) is leaked to an adversary …
about the secret key (and possibly other internal state information) is leaked to an adversary …
Mode-level vs. implementation-level physical security in symmetric cryptography: a practical guide through the leakage-resistance jungle
Triggered by the increasing deployment of embedded cryptographic devices (eg, for the
IoT), the design of authentication, encryption and authenticated encryption schemes …
IoT), the design of authentication, encryption and authenticated encryption schemes …