[PDF][PDF] 侧信道攻击与防御技术研究进展
王永娟, 樊昊鹏, 代政一, 袁庆军, 王相宾 - 计算机学报, 2023 - 159.226.43.17
摘要侧信道攻击利用密码实现的物理泄露而不是理论弱点来恢复密钥, 对密码系统的安全实现有
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …
[HTML][HTML] Continuously non-malleable codes with split-state refresh
Non-malleable codes for the split-state model allow to encode a message into two parts,
such that arbitrary independent tampering on each part, and subsequent decoding of the …
such that arbitrary independent tampering on each part, and subsequent decoding of the …
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates
Non-malleable codes were introduced by Dziembowski et al.(in: Yao (ed) ICS2010,
Tsinghua University Press, 2010), and its main application is the protection of cryptographic …
Tsinghua University Press, 2010), and its main application is the protection of cryptographic …
Rate-optimizing compilers for continuously non-malleable codes
We study the rate of so-called continuously non-malleable codes, which allow to encode a
message in such a way that (possibly adaptive) continuous tampering attacks on the …
message in such a way that (possibly adaptive) continuous tampering attacks on the …
Short non-malleable codes from related-key secure block ciphers
A non-malleable code is an unkeyed randomized encoding scheme that offers the strong
guarantee that decoding a tampered codeword either results in the original message, or in …
guarantee that decoding a tampered codeword either results in the original message, or in …
Non-malleable codes for partial functions with manipulation detection
Non-malleable codes were introduced by Dziembowski, Pietrzak and Wichs (ICS'10) and its
main application is the protection of cryptographic devices against tampering attacks on …
main application is the protection of cryptographic devices against tampering attacks on …
[HTML][HTML] Continuously non-malleable codes in the split-state model
Non-malleable codes (Dziembowski et al., ICS'10 and J. ACM'18) are a natural relaxation of
error correcting/detecting codes with useful applications in cryptography. Informally, a code …
error correcting/detecting codes with useful applications in cryptography. Informally, a code …
Practical continuously non-malleable randomness encoders in the random oracle model
A Faonio - International Conference on Cryptology and Network …, 2021 - Springer
A randomness encoder is a generalization of encoding schemes with an efficient procedure
for encoding uniformly random strings. In this paper we continue the study of randomness …
for encoding uniformly random strings. In this paper we continue the study of randomness …
Linear-time non-malleable codes in the bit-wise independent tampering model
R Cramer, I Damgård, N Döttling, I Giacomelli… - … Theoretic Security: 10th …, 2017 - Springer
Non-malleable codes were introduced by Dziembowski et al.(ICS 2010) as coding schemes
that protect a message against tampering attacks. Roughly speaking, a code is non …
that protect a message against tampering attacks. Roughly speaking, a code is non …
Cryptographic techniques for hardware security
I Tselekounis, Y Tselekounis - 2018 - era.ed.ac.uk
Traditionally, cryptographic algorithms are designed under the so-called black-box model,
which considers adversaries that receive black-box access to the hardware implementation …
which considers adversaries that receive black-box access to the hardware implementation …