Unifying leakage models: from probing attacks to noisy leakage.

A Duc, S Dziembowski, S Faust - … on the Theory and Applications of …, 2014 - Springer
A recent trend in cryptography is to formally show the leakage resilience of cryptographic
implementations in a given leakage model. A realistic model is to assume that leakages are …

A survey of leakage-resilient cryptography

YT Kalai, L Reyzin - Providing Sound Foundations for Cryptography: On …, 2019 - dl.acm.org
In the past 15 years, cryptography has made considerable progress in expanding the
adversarial attack model to cover side-channel attacks and has built schemes to provably …

Unifying leakage models: From probing attacks to noisy leakage

A Duc, S Dziembowski, S Faust - Journal of Cryptology, 2019 - Springer
A recent trend in cryptography is to formally show the leakage resilience of cryptographic
implementations in a given leakage model. One of the most prominent leakage model—the …

Bounded indistinguishability and the complexity of recovering secrets

A Bogdanov, Y Ishai, E Viola, C Williamson - Annual International …, 2016 - Springer
Motivated by cryptographic applications, we study the notion of bounded indistinguishability,
a natural relaxation of the well studied notion of bounded independence. We say that two …

A tamper and leakage resilient von Neumann architecture

S Faust, P Mukherjee, JB Nielsen, D Venturi - … International Workshop on …, 2015 - Springer
We present a universal framework for tamper and leakage resilient computation on a
random access machine (RAM). The RAM has one CPU that accesses a storage, which we …

Efficient multiparty protocols via log-depth threshold formulae

G Cohen, IB Damgård, Y Ishai, J Kölker… - Advances in Cryptology …, 2013 - Springer
We put forward a new approach for the design of efficient multiparty protocols: 1 Design a
protocol π for a small number of parties (say, 3 or 4) which achieves security against a single …

On continual leakage of discrete log representations

S Agrawal, Y Dodis, V Vaikuntanathan… - … Conference on the Theory …, 2013 - Springer
Let G be a group of prime order q, and let g 1,…, gn be random elements of G. We say that a
vector x= (x_1,...,x_n)∈Z_q^n is a discrete log representation of some some element y∈G …

Leakage-resilient circuits revisited–optimal number of computing components without leak-free hardware

D Dachman-Soled, FH Liu, HS Zhou - … on the Theory and Applications of …, 2015 - Springer
Side channel attacks–attacks that exploit implementation-dependent information of a
cryptosystem–have been shown to be highly detrimental, and the cryptographic community …

Unconditionally secure computation against low-complexity leakage

A Bogdanov, Y Ishai, A Srinivasan - … , Santa Barbara, CA, USA, August 18 …, 2019 - Springer
We consider the problem of constructing leakage-resilient circuit compilers that are secure
against global leakage functions with bounded output length. By global, we mean that the …

Leakage-Tolerant Circuits

Y Ishai, Y Song - Annual International Conference on the Theory and …, 2024 - Springer
A leakage-resilient circuit for f:{0, 1} n→{0, 1} m is a randomized Boolean circuit C mapping
a randomized encoding of an input x to an encoding of y= f (x), such that applying any …