메뉴 건너뛰기




Volumn , Issue , 2010, Pages 44-56

Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC PRIMITIVES; CRYPTOSYSTEMS; LEAKAGE-RESILIENCE; MIN-ENTROPY; PUBLIC KEY CRYPTOSYSTEMS; SIDE CHANNEL ATTACK; STATE OF THE ART; TIMING ATTACKS;

EID: 77957606219     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2010.11     Document Type: Conference Paper
Times cited : (78)

References (27)
  • 2
    • 70350340328 scopus 로고    scopus 로고
    • Leakage-resilient public-key cryptography in the bounded-retrieval model
    • Springer, Lecture Notes in Computer Science
    • Joël Alwen, Yevgeniy Dodis, and Daniel Wichs. Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model. In Proc. Advances in Cryptology (CRYPTO 2009), volume 5677, pages 36-54. Springer, Lecture Notes in Computer Science.
    • Proc. Advances in Cryptology (CRYPTO 2009) , vol.5677 , pp. 36-54
    • Alwen, J.1    Dodis, Y.2    Wichs, D.3
  • 3
    • 57049126579 scopus 로고    scopus 로고
    • Formally bounding the side-channel leakage in unknown-message attacks
    • Springer, Volume 5283 of Lecture Notes in Computer Science
    • Michael Backes and Boris Köpf. Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks. In Proc. 13th European Symposium on Research in Computer Security (ESORICS 2008), volume 5283 of Lecture Notes in Computer Science, pages 517-532. Springer, 2008.
    • (2008) Proc. 13th European Symposium on Research in Computer Security (ESORICS 2008) , pp. 517-532
    • Backes, M.1    Köpf., B.2
  • 6
    • 18844454571 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • David Brumley and Dan Boneh. Remote timing attacks are practical. Computer Networks, 48(5):701-716, 2005.
    • (2005) Computer Networks , vol.48 , Issue.5 , pp. 701-716
    • Brumley, D.1    Boneh, D.2
  • 13
    • 28044445125 scopus 로고    scopus 로고
    • Timing aware information flow security for a javacard-like bytecode
    • Daniel Hedin and David Sands. Timing Aware Information Flow Security for a JavaCard-like Bytecode. Electronic Notes in Theoretical Computer Science (ENTCS), 141(1):163-182, 2005.
    • (2005) Electronic Notes in Theoretical Computer Science (ENTCS) , vol.141 , Issue.1 , pp. 163-182
    • Hedin, D.1    Sands, D.2
  • 15
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
    • Springer, Volume 1109 of Lecture Notes in Computer Science
    • Paul Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Proc. Advances in Cryptology (CRYPTO 1996), volume 1109 of Lecture Notes in Computer Science, pages 104-113. Springer, 1996.
    • (1996) Proc. Advances in Cryptology (CRYPTO 1996) , pp. 104-113
    • Kocher, P.1
  • 20
    • 35048852134 scopus 로고    scopus 로고
    • Physically observable cryptography (Extended Abstract)
    • Springer, Volume 2951 of Lecture Notes in Computer Science
    • Silvio Micali and Leonid Reyzin. Physically Observable Cryptography (Extended Abstract). In Proc. First Theory of Cryptography Conference (TCC 2004), volume 2951 of Lecture Notes in Computer Science, pages 278-296. Springer, 2004.
    • (2004) Proc. First Theory of Cryptography Conference (TCC 2004) , pp. 278-296
    • Micali, S.1    Reyzin, L.2
  • 21
    • 70350303869 scopus 로고    scopus 로고
    • Public-key cryptosystems resilient to key leakage
    • Springer, Volume 5677 of Lecture Notes in Computer Science
    • Moni Naor and Gil Segev. Public-Key Cryptosystems Resilient to Key Leakage. In Proc. Advances in Cryptology (CRYPTO 2009), volume 5677 of Lecture Notes in Computer Science, pages 18-35. Springer, 2009.
    • (2009) Proc. Advances in Cryptology (CRYPTO 2009) , pp. 18-35
    • Naor, M.1    Segev, G.2
  • 23
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • Springer, Volume 576 of Lecture Notes in Computer Science
    • Charles Rackoff and Daniel R. Simon. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In Proc. Advances in Cryptology (CRYPTO 1991), volume 576 of Lecture Notes in Computer Science, pages 433-444. Springer, 1992.
    • (1992) Proc. Advances in Cryptology (CRYPTO 1991) , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.