-
1
-
-
77952407699
-
Simultaneous hardcore bits and cryptography against memory attacks
-
Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: TCC (2009)
-
TCC 2009
-
-
Akavia, A.1
Goldwasser, S.2
Vaikuntanathan, V.3
-
2
-
-
35248890430
-
Computational analogues of entropy
-
Barak, B., Shaltiel, R., Wigderson, A.: Computational analogues of entropy. In: RANDOM-APPROX, pp. 200-215 (2003)
-
(2003)
RANDOM-APPROX
, pp. 200-215
-
-
Barak, B.1
Shaltiel, R.2
Wigderson, A.3
-
3
-
-
84958641478
-
Differential Fault Analysis of Secret Key Cryptosystems
-
Advances in Cryptology - CRYPTO '97
-
Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.1294, pp. 513-525. Springer, Heidelberg (1997) (Pubitemid 127112576)
-
(1997)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
4
-
-
84957355967
-
On the Importance of Checking Cryptographic Protocols for Faults
-
Advances in Cryptology - Eurocrypt '97
-
Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.1233, pp. 37-51. Springer, Heidelberg (1997) (Pubitemid 127067792)
-
(1997)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1233
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.A.2
Lipton, R.J.3
-
5
-
-
49049102095
-
How to protect yourself without perfect shredding
-
In: Aceto, L., Damg̊ard, I., Goldberg, L.A., Halld́orsson, M.M., Inǵolfsd́ottir, A., Walukiewicz, I. (eds.) LNCS, Springer, Heidelberg
-
Canetti, R., Eiger, D., Goldwasser, S., Lim, D.-Y.: How to protect yourself without perfect shredding. In: Aceto, L., Damg̊ard, I., Goldberg, L.A., Halld́orsson, M.M., Inǵolfsd́ottir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol.5126, pp. 511-523. Springer, Heidelberg (2008)
-
(2008)
ICALP 2008
, vol.5126
, Issue.PART 2
, pp. 511-523
-
-
Canetti, R.1
Eiger, D.2
Goldwasser, S.3
Lim, D.-Y.4
-
6
-
-
38049016824
-
Intrusionresilient key exchange in the bounded retrieval model
-
In: Vadhan,S.P. (ed.) LNCS, Springer, Heidelberg
-
Cash, D.M., Ding, Y.Z., Dodis, Y., Lee, W., Lipton, R.J., Walfish, S.: Intrusionresilient key exchange in the bounded retrieval model. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol.4392, pp. 479-498. Springer, Heidelberg (2007)
-
(2007)
TCC 2007
, vol.4392
, pp. 479-498
-
-
Cash, D.M.1
Ding, Y.Z.2
Dodis, Y.3
Lee, W.4
Lipton, R.J.5
Walfish, S.6
-
7
-
-
35248899532
-
Template attacks
-
In: Kaliski Jr.B.S.Ko̧c, ÇK., Paar, C. (eds.) LNCS, Springer, Heidelberg
-
Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski Jr., B.S., Ko̧c, Ç .K., Paar, C. (eds.) CHES 2002. LNCS, vol.2523, pp. 13-28. Springer, Heidelberg (2003)
-
(2003)
CHES 2002
, vol.2523
, pp. 13-28
-
-
Chari, S.1
Rao, J.R.2
Rohatgi, P.3
-
8
-
-
84880293917
-
Resistance against differential power analysis for elliptic curve cryptosystems
-
In: Ko̧c, ÇK., Paar, C. (eds.) LNCS, Springer, Heidelberg
-
Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Ko̧c, Ç .K., Paar, C. (eds.) CHES 1999. LNCS, vol.1717, p. 292. Springer, Heidelberg (1999)
-
(1999)
CHES 1999
, vol.1717
, pp. 292
-
-
Coron, J.-S.1
-
9
-
-
50249137714
-
Algebraic and slide attacks on keeLoq
-
In: Nyberg,K. (ed.) LNCS, Springer, Heidelberg
-
Courtois, N.T., Bard, G.V., Wagner, D.: Algebraic and slide attacks on keeLoq. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.5086, pp. 97-115. Springer, Heidelberg (2008)
-
(2008)
FSE 2008
, vol.5086
, pp. 97-115
-
-
Courtois, N.T.1
Bard, G.V.2
Wagner, D.3
-
10
-
-
33745629609
-
Perfectly secure password protocols in the bounded retrieval model
-
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
Di Crescenzo, G., Lipton, R.J., Walfish, S.: Perfectly secure password protocols in the bounded retrieval model. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol.3876, pp. 225-244. Springer, Heidelberg (2006) (Pubitemid 43982458)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3876
, pp. 225-244
-
-
Di Crescenzo, G.1
Lipton, R.2
Walfish, S.3
-
11
-
-
84945116168
-
On Perfect and Adaptive Security in Exposure-Resilient Cryptography
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
Dodis, Y., Sahai, A., Smith, A.: On perfect and adaptive security in exposureresilient cryptography. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.2045, pp. 301-324. Springer, Heidelberg (2001) (Pubitemid 33275839)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2045
, pp. 301-324
-
-
Dodis, Y.1
Sahai, A.2
Smith, A.3
-
13
-
-
33745532541
-
Intrusion-resilience via the bounded-storage model
-
DOI 10.1007/11681878-11, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
Dziembowski, S.: Intrusion-resilience via the bounded-storage model. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol.3876, pp. 207-224. Springer, Heidelberg (2006) (Pubitemid 43979851)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3876
, pp. 207-224
-
-
Dziembowski, S.1
-
14
-
-
33749583877
-
On forward-secure storage extended abstract
-
In: Dwork,C. (ed.) LNCS, Springer, Heidelberg
-
Dziembowski, S.: On forward-secure storage (extended abstract). In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.4117, pp. 251-270. Springer, Heidelberg (2006)
-
(2006)
CRYPTO 2006
, vol.4117
, pp. 251-270
-
-
Dziembowski, S.1
-
15
-
-
35048832981
-
On generating the initial key in the boundedstorage model
-
In: Cachin, C., Camenisch, J.L. (eds.) LNCS, Springer, Heidelberg
-
Dziembowski, S., Maurer, U.M.: On generating the initial key in the boundedstorage model. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 126-137. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004
, vol.3027
, pp. 126-137
-
-
Dziembowski, S.1
Maurer, U.M.2
-
16
-
-
46749096773
-
Intrusion-resilient secret sharing
-
Dziembowski, S., Pietrzak, K.: Intrusion-resilient secret sharing. In: FOCS, pp. 227-237 (2007)
-
(2007)
FOCS
, pp. 227-237
-
-
Dziembowski, S.1
Pietrzak, K.2
-
18
-
-
51849131973
-
On the power of power analysis in the real world: A complete break of the keeLoq code hopping scheme
-
In: Wagner,D. (ed.) LNCS, Springer, Heidelberg
-
Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.T.M.: On the power of power analysis in the real world: A complete break of the keeLoq code hopping scheme. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.5157, pp. 203-220. Springer, Heidelberg (2008)
-
(2008)
CRYPTO 2008
, vol.5157
, pp. 203-220
-
-
Eisenbarth, T.1
Kasper, T.2
Moradi, A.3
Paar, C.4
Salmasizadeh, M.5
Shalmani, M.T.M.6
-
19
-
-
35248862449
-
Electromagnetic Analysis: Concrete Results
-
Cryptographic Hardware and Embedded Systems - CHES 2001
-
Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: Concrete results. In: CHES, pp. 251-261 (2001) (Pubitemid 33329068)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2162
, pp. 251-261
-
-
Gandolfi, K.1
Mourtel, C.2
Olivier, F.3
-
20
-
-
0027306732
-
A uniform-complexity treatment of encryption and zero-knowledge
-
Goldreich, O.: A uniform-complexity treatment of encryption and zero-knowledge. Journal of Cryptology 6(1), 21-53 (1993)
-
(1993)
Journal of Cryptology
, vol.6
, Issue.1
, pp. 21-53
-
-
Goldreich, O.1
-
21
-
-
0021567758
-
How to construct random functions
-
Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. In: FOCS, pp. 464-479 (1984)
-
(1984)
FOCS
, pp. 464-479
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
22
-
-
51849168583
-
One-time programs
-
In: Wagner,D. (ed.) LNCS, Springer, Heidelberg
-
Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: One-time programs. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.5157, pp. 39-56. Springer, Heidelberg (2008)
-
(2008)
CRYPTO 2008
, vol.5157
, pp. 39-56
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.N.3
-
23
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: Cold boot attacks on encryption keys. In: USENIX Security Symposium, pp. 45-60 (2008)
-
(2008)
USENIX Security Symposium
, pp. 45-60
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
24
-
-
40249089887
-
On seed-incompressible functions
-
In: Canetti,R. (ed.) LNCS, Springer, Heidelberg
-
Halevi, S., Myers, S., Rackoff, C.: On seed-incompressible functions. In: Canetti, R. (ed.) TCC 2008. LNCS, vol.4948, pp. 19-36. Springer, Heidelberg (2008)
-
(2008)
TCC 2008
, vol.4948
, pp. 19-36
-
-
Halevi, S.1
Myers, S.2
Rackoff, C.3
-
25
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
H̊astad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM Journal on Computing 28(4), 1364-1396 (1999)
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
H̊astad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
26
-
-
84947403595
-
Probability inequalities for sums of bounded random variables
-
Hoeffding, W.: Probability inequalities for sums of bounded random variables. Journal of the American Statistical Association 58(301), 13-30 (1963)
-
(1963)
Journal of the American Statistical Association
, vol.58
, Issue.301
, pp. 13-30
-
-
Hoeffding, W.1
-
27
-
-
67650693669
-
A practical attack on keeLoq
-
In: Pfitzma B.(ed.) LNCS, Springer, Heidelberg
-
Indesteege, S., Keller, N., Dunkelman, O., Biham, E., Preneel, B.: A practical attack on KeeLoq. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.2045, pp. 1-18. Springer, Heidelberg (2001)
-
(2001)
EUROCRYPT 2001
, vol.2045
, pp. 1-18
-
-
Indesteege, S.1
Keller, N.2
Dunkelman, O.3
Biham, E.4
Preneel, B.5
-
28
-
-
33746066725
-
Private circuits II: Keeping secrets in tamperable circuits
-
DOI 10.1007/11761679-19, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Ishai, Y., Prabhakaran, M., Sahai, A., Wagner, D.: Private circuits II: Keeping secrets in tamperable circuits. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.4004, pp. 308-327. Springer, Heidelberg (2006) (Pubitemid 44072247)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004
, pp. 308-327
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
Wagner, D.4
-
29
-
-
35248830337
-
Private circuits: Securing hardware against probing attacks
-
Ishai, Y., Sahai, A., Wagner, D.: Private circuits: Securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.2729, pp. 463-481. Springer, Heidelberg (2003) (Pubitemid 137636958)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2729
, pp. 463-481
-
-
Ishai, Y.1
Sahai, A.2
Wagner, D.3
-
30
-
-
84958769993
-
Side Channel Cryptanalysis of Product Ciphers
-
Computer Security - ESORICS 98
-
Kelsey, J., Schneier, B., Wagner, D., Hall, C.: Side channel cryptanalysis of product ciphers. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol.1485, pp. 97-110. Springer, Heidelberg (1998) (Pubitemid 128135767)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1485
, pp. 97-110
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
31
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Advances in Cryptology - CRYPTO '96
-
Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.1109, pp. 104-113. Springer, Heidelberg (1996) (Pubitemid 126106234)
-
(1996)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
32
-
-
67650658687
-
Design and validation strategies for obtaining assurance in countermeasures to power analysis and related attacks
-
Kocher, P.C.: Design and validation strategies for obtaining assurance in countermeasures to power analysis and related attacks. In: Proceedings of the NIST Physical Security Workshop (2005)
-
(2005)
Proceedings of the NIST Physical Security Workshop
-
-
Kocher, P.C.1
-
33
-
-
84939573910
-
Differential power analysis
-
In: Wiener,M. (ed.) LNCS, Springer, Heidelberg
-
Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.1666, pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
CRYPTO 1999
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
34
-
-
85043762670
-
A provably-secure strongly-randomized cipher
-
In: Damg̊ard,I.B. (ed.) LNCS, Springer, Heidelberg
-
Maurer, U.M.: A provably-secure strongly-randomized cipher. In: Damg̊ard, I.B. (ed.) EUROCRYPT 1990. LNCS, vol.473, pp. 361-373. Springer, Heidelberg (1991)
-
(1991)
EUROCRYPT 1990
, vol.473
, pp. 361-373
-
-
Maurer, U.M.1
-
35
-
-
35048852134
-
Physically observable cryptography (extended abstract)
-
Micali, S., Reyzin, L.: Physically observable cryptography (extended abstract). In: Naor, M. (ed.) TCC 2004. LNCS, vol.2951, pp. 278-296. Springer, Heidelberg (2004) (Pubitemid 39737610)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2951
, pp. 278-296
-
-
Micali, S.1
Reyzin, L.2
-
36
-
-
77952354675
-
A block cipher based pseudo random number generator secure against side-channel key recovery
-
Petit, C., Standaert, F.-X., Pereira, O., Malkin, T., Yung, M.: A block cipher based pseudo random number generator secure against side-channel key recovery. In: ASIACCS, pp. 56-65 (2008)
-
(2008)
ASIACCS
, pp. 56-65
-
-
Petit, C.1
Standaert, F.-X.2
Pereira, O.3
Malkin, T.4
Yung, M.5
-
37
-
-
67650664894
-
-
Full version of this paper
-
Pietrzak, K.: Full version of this paper, http://homepages.cwi.nl/ pietrzak/publications.html
-
-
-
Pietrzak, K.1
-
38
-
-
38049144160
-
Range extension for weak pRFs; the good, the bad, and the ugly
-
In: Naor, M. (ed.) LNCS, Springer, Heidelberg
-
Pietrzak, K., Sjödin, J.: Range extension for weak pRFs; the good, the bad, and the ugly. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol.4515, pp. 517-533. Springer, Heidelberg (2007)
-
(2007)
EUROCRYPT 2007
, vol.4515
, pp. 517-533
-
-
Pietrzak, K.1
Sjödin, J.2
-
39
-
-
78650238574
-
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards
-
Smart Card Programming and Security
-
Quisquater, J.-J., Samyde, D.: Electromagnetic analysis (ema): Measures and counter-measures for smart cards. In: E-smart, pp. 200-210 (2001) (Pubitemid 33340056)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2140
, pp. 200-210
-
-
Quisquater, J.-J.1
Samyde, D.2
-
40
-
-
57949114014
-
Dense subsets of pseudorandom sets
-
Reingold, O., Trevisan, L., Tulsiani, M., Vadhan, S.P.: Dense subsets of pseudorandom sets. In: FOCS, pp. 76-85 (2008)
-
(2008)
FOCS
, pp. 76-85
-
-
Reingold, O.1
Trevisan, L.2
Tulsiani, M.3
Vadhan, S.P.4
-
41
-
-
67650694228
-
A unified framework for the analysis of side-channel key recovery attacks
-
In: Joux, A. (ed.) LNCS, Springer, Heidelberg
-
Standaert, F.-X., Malkin, T., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.5479, pp. 443-461. Springer, Heidelberg (2009)
-
EUROCRYPT 2009
, vol.5479
, Issue.2009
, pp. 443-461
-
-
Standaert, F.-X.1
Malkin, T.2
Yung, M.3
-
42
-
-
4344628859
-
Constructing locally computable extractors and cryptosystems in the bounded-storage model
-
Vadhan, S.P.: Constructing locally computable extractors and cryptosystems in the bounded-storage model. Journal of Cryptology 17(1), 43-77 (2004)
-
(2004)
Journal of Cryptology 17
, Issue.1
, pp. 43-77
-
-
Vadhan, S.P.1
|