-
1
-
-
70350627587
-
Simultaneous hardcore bits and cryptography against memory attacks
-
Omer Reingold, editor, TCC. Springer
-
Adi Akavia, Shaff Goldwasser, and Vinod Vaikuntanathan. Simultaneous hardcore bits and cryptography against memory attacks. In Omer Reingold, editor, TCC, volume 5444 of Lecture Notes in Computer Science, pages 474-495. Springer, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5444
, pp. 474-495
-
-
Akavia, A.1
Goldwasser, S.2
Vaikuntanathan, V.3
-
2
-
-
84937438279
-
Power analysis, what is now possible
-
Proceedings of ASIACRYPT 2001, Kyoto, Japan, dec
-
M.L. Akkar, R. Bévan, P. Dischamp, and D. Moyart. Power analysis, what is now possible. . . . In Proceedings of ASIACRYPT 2001, volume 1976 of LNCS, pages 489-502, Kyoto, Japan, dec 2001.
-
(2001)
LNCS
, vol.1976
, pp. 489-502
-
-
Akkar, M.L.1
Bévan, R.2
Dischamp, P.3
Moyart, D.4
-
3
-
-
84873365626
-
Leakage-resilient public-key cryptography in the bounded-retrieval model
-
Joël Alwen, Yevgeniy Dodis, and Daniel Wichs. Leakage-resilient public-key cryptography in the bounded-retrieval model. In Halevi [14], pages 36-54.
-
Halevi
, vol.14
, pp. 36-54
-
-
Alwen, J.1
Dodis, Y.2
Wichs, D.3
-
4
-
-
78650016796
-
Memory leakage-resilient encryption based on physically unclonable functions
-
Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, and Pim Tuyls. Memory leakage-resilient encryption based on physically unclonable functions. In Matsui [22], pages 685-702.
-
Matsui
, vol.22
, pp. 685-702
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.-R.3
Sunar, B.4
Tuyls, P.5
-
5
-
-
33745629609
-
Perfectly secure password protocols in the bounded retrieval model
-
Shai Halevi and Tal Rabin, Editors, Third Theory of Cryptography Conference, TCC 2006. Springer
-
Giovanni Di Crescenzo, Richard J. Lipton, and Shabsi Walfish. Perfectly secure password protocols in the bounded retrieval model. In Shai Halevi and Tal Rabin, editors, Third Theory of Cryptography Conference, TCC 2006, volume 3876 of Lecture Notes in Computer Science, pages 225-244. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3876
, pp. 225-244
-
-
Di Crescenzo, G.1
Lipton, R.J.2
Walfish, S.3
-
6
-
-
70350674336
-
On cryptography with auxiliary input
-
Bethesda, Maryland, jun. ACM
-
Y. Dodis, Y. Tauman Kalai, and S. Lovett. On cryptography with auxiliary input. In Proceedings of STOC 2009, pages 621-630, Bethesda, Maryland, jun 2009. ACM.
-
(2009)
Proceedings of STOC 2009
, pp. 621-630
-
-
Dodis, Y.1
Tauman Kalai, Y.2
Lovett, S.3
-
7
-
-
78650028076
-
Public-key encryption schemes with auxiliary inputs
-
Yevgeniy Dodis, Shaff Goldwasser, Yael Tauman Kalai, Chris Peikert, and Vinod Vaikuntanathan. Public-key encryption schemes with auxiliary inputs. In Micciancio [24], pages 361-381.
-
Micciancio
, vol.24
, pp. 361-381
-
-
Dodis, Y.1
Goldwasser, S.2
Kalai, Y.T.3
Peikert, C.4
Vaikuntanathan, V.5
-
8
-
-
33745532541
-
Intrusion-resilience via the bounded-storage model
-
Shai Halevi and Tal Rabin, editors, Third Theory of Cryptography Conference, TCC 2006. Springer
-
Stefan Dziembowski. Intrusion-resilience via the bounded-storage model. In Shai Halevi and Tal Rabin, editors, Third Theory of Cryptography Conference, TCC 2006, volume 3876 of Lecture Notes in Computer Science, pages 207-224. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3876
, pp. 207-224
-
-
Dziembowski, S.1
-
9
-
-
57949107348
-
Leakage-resilient cryptography
-
IEEE Computer Society
-
Stefan Dziembowski and Krzysztof Pietrzak. Leakage-resilient cryptography. In FOCS, pages 293-302. IEEE Computer Society, 2008.
-
(2008)
FOCS
, pp. 293-302
-
-
Dziembowski, S.1
Pietrzak, K.2
-
10
-
-
78650015961
-
Leakage-resilient signatures
-
Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, and Guy N. Rothblum. Leakage-resilient signatures. In Micciancio [24], pages 343-360.
-
Micciancio
, vol.24
, pp. 343-360
-
-
Faust, S.1
Kiltz, E.2
Pietrzak, K.3
Rothblum, G.N.4
-
11
-
-
77949638234
-
Protecting circuits from computationally-bounded leakage
-
Report 2009/379
-
Sebastian Faust, Leonid Reyzin, and Eran Tromer. Protecting circuits from computationally-bounded leakage. Cryptology ePrint Archive, Report 2009/379, 2009. http://eprint.iacr.org/.
-
(2009)
Cryptology EPrint Archive
-
-
Faust, S.1
Reyzin, L.2
Tromer, E.3
-
12
-
-
51849168583
-
One-time programs
-
David Wagner, editor, CRYPTO. Springer
-
Shaff Goldwasser, Yael Tauman Kalai, and Guy N. Rothblum. One-time programs. In David Wagner, editor, CRYPTO, volume 5157 of Lecture Notes in Computer Science, pages 39-56. Springer, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5157
, pp. 39-56
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.N.3
-
13
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
Paul C. van Oorschot, editor. USENIX Association
-
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, and Edward W. Felten. Lest we remember: Cold boot attacks on encryption keys. In Paul C. van Oorschot, editor, USENIX Security Symposium, pages 45-60. USENIX Association, 2008.
-
(2008)
USENIX Security Symposium
, pp. 45-60
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
14
-
-
78650029533
-
-
Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings. Springer
-
Shai Halevi, editor. Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, volume 5677 of Lecture Notes in Computer Science. Springer, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5677
-
-
Halevi, S.1
-
15
-
-
40249089887
-
On seed-incompressible functions
-
Ran Canetti, editor, TCC. Springer
-
Shai Halevi, Steven Myers, and Charles Rackoff. On seed-incompressible functions. In Ran Canetti, editor, TCC, volume 4948 of Lecture Notes in Computer Science, pages 19-36. Springer, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.4948
, pp. 19-36
-
-
Halevi, S.1
Myers, S.2
Rackoff, C.3
-
16
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
Johan Håstad, Russell Impagliazzo, Leonid A. Levin, and Michael Luby. A pseudorandom generator from any one-way function. SIAM J. Comput., 28(4):1364-1396, 1999.
-
(1999)
SIAM J. Comput.
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
17
-
-
78650030960
-
-
Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings. Springer
-
Antoine Joux, editor. Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, volume 5479 of Lecture Notes in Computer Science. Springer, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5479
-
-
Joux, A.1
-
18
-
-
24144444705
-
Fox : A new family of block ciphers
-
Helena Handschuh and M. Anwar Hasan, editors, Selected Areas in Cryptography. Springer
-
Pascal Junod and Serge Vaudenay. Fox : A new family of block ciphers. In Helena Handschuh and M. Anwar Hasan, editors, Selected Areas in Cryptography, volume 3357 of Lecture Notes in Computer Science, pages 114-129. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3357
, pp. 114-129
-
-
Junod, P.1
Vaudenay, S.2
-
19
-
-
78650011648
-
Signature schemes with bounded leakage resilience
-
Jonathan Katz and Vinod Vaikuntanathan. Signature schemes with bounded leakage resilience. In Matsui [22], pages 703-720.
-
Matsui
, vol.22
, pp. 703-720
-
-
Katz, J.1
Vaikuntanathan, V.2
-
20
-
-
77952362571
-
Leak resistant cryptographic indexed key update
-
US Patent 6539092
-
P. Kocher. Leak resistant cryptographic indexed key update. US Patent 6539092.
-
-
-
Kocher, P.1
-
21
-
-
84939573910
-
Differential power analysis
-
Michael J. Wiener, editor, CRYPTO. Springer
-
Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Differential power analysis. In Michael J. Wiener, editor, CRYPTO, volume 1666 of Lecture Notes in Computer Science, pages 388-397. Springer, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
22
-
-
78649999448
-
-
Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings. Springer
-
Mitsuru Matsui, editor. Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, volume 5912 of Lecture Notes in Computer Science. Springer, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5912
-
-
Matsui, M.1
-
23
-
-
35048852134
-
Physically observable cryptography (extended abstract)
-
Moni Naor, editor, TCC. Springer
-
Silvio Micali and Leonid Reyzin. Physically observable cryptography (extended abstract). In Moni Naor, editor, TCC, volume 2951 of Lecture Notes in Computer Science, pages 278-296. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2951
, pp. 278-296
-
-
Micali, S.1
Reyzin, L.2
-
24
-
-
78649996936
-
-
Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings. Springer
-
Daniele Micciancio, editor. Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings, volume 5978 of Lecture Notes in Computer Science. Springer, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.5978
-
-
Micciancio, D.1
-
25
-
-
78650812710
-
Public-key cryptosystems resilient to key leakage
-
Moni Naor and Gil Segev. Public-key cryptosystems resilient to key leakage. In Halevi [14], pages 18-35.
-
Halevi
, vol.14
, pp. 18-35
-
-
Naor, M.1
Segev, G.2
-
26
-
-
84937420653
-
Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case
-
Advances in Cryptology - CRYPTO 2002. Springer
-
Jesper Buus Nielsen. Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. In Advances in Cryptology - CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 111-126. Springer, 2002.
-
Lecture Notes in Computer Science
, vol.2442
, Issue.2002
, pp. 111-126
-
-
Nielsen, J.B.1
-
28
-
-
77952354675
-
A block cipher based pseudo random number generator secure against side-channel key recovery
-
Masayuki Abe and Virgil D. Gligor, Editors. ACM
-
Christophe Petit, François-Xavier Standaert, Olivier Pereira, Tal Malkin, and Moti Yung. A block cipher based pseudo random number generator secure against side-channel key recovery. In Masayuki Abe and Virgil D. Gligor, editors, ASIACCS, pages 56-65. ACM, 2008.
-
(2008)
ASIACCS
, pp. 56-65
-
-
Petit, C.1
Standaert, F.-X.2
Pereira, O.3
Malkin, T.4
Yung, M.5
-
29
-
-
78650011944
-
A leakage-resilient mode of operation
-
Krzysztof Pietrzak. A leakage-resilient mode of operation. In Joux [17], pages 462-482.
-
Joux
, vol.17
, pp. 462-482
-
-
Pietrzak, K.1
-
30
-
-
33746082293
-
Eddy current for magnetic analysis with active sensor
-
Nice, France
-
Jean-Jacques Quisquater and David Samyde. Eddy current for Magnetic Analysis with Active Sensor. In Esmart 2002, Nice, France, 2002.
-
(2002)
Esmart 2002
-
-
Quisquater, J.-J.1
Samyde, D.2
-
31
-
-
78649989280
-
Algebraic side-channel attacks
-
to appear in the proceedings of Inscrypt 2009, Behing, China, December. Springer, Cryptology ePrint Archive, Report 2009/279
-
M. Renauld and F.-X. Standaert. Algebraic side-channel attacks. to appear in the proceedings of Inscrypt 2009, Lecture Notes in Computer Science, Behing, China, December 2009, Springer, Cryptology ePrint Archive, Report 2009/279. http://eprint.iacr.org/2009/279.
-
(2009)
Lecture Notes in Computer Science
-
-
Renauld, M.1
Standaert, F.-X.2
-
32
-
-
70350576829
-
Algebraic side-channel attacks on the aes: Why time also matters in dpa
-
Proceedings of CHES 2009, Lausanne, Switzerland, sep. Springer
-
M. Renauld, F.-X. Standaert, and N. Veyrat-Charvillon. Algebraic side-channel attacks on the aes: Why time also matters in dpa. In Proceedings of CHES 2009, volume 5746 of LNCS, pages 97-111, Lausanne, Switzerland, sep 2009. Springer.
-
(2009)
LNCS
, vol.5746
, pp. 97-111
-
-
Renauld, M.1
Standaert, F.-X.2
Veyrat-Charvillon, N.3
-
33
-
-
78649998330
-
A unified framework for the analysis of side-channel key recovery attacks
-
François-Xavier Standaert, Tal Malkin, and Moti Yung. A unified framework for the analysis of side-channel key recovery attacks. In Joux [17], pages 443-461.
-
Joux
, vol.17
, pp. 443-461
-
-
Standaert, F.-X.1
Malkin, T.2
Yung, M.3
-
34
-
-
77955866745
-
How leaky is an extractor?
-
the proceedings of LatinCrypt 2010, Puebla, Mexico, August
-
Francois-Xavier Standaert. How leaky is an extractor? in the proceedings of LatinCrypt 2010, Lecture Notes in Computer Science, vol 6212, Puebla, Mexico, August 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6212
-
-
Standaert, F.-X.1
-
35
-
-
84998557355
-
Leakage resilient cryptography in practice
-
Springer 2010, Cryptology ePrint Archive, Report 2009/341
-
Francois-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, and Elisabeth Oswald. Leakage resilient cryptography in practice. in "Towards Hardware Intrinsic Security: Foundation and Practice", pp 105- 139, Springer, 2010, Cryptology ePrint Archive, Report 2009/341, 2009. http://eprint.iacr.org/.
-
(2009)
Towards Hardware Intrinsic Security: Foundation and Practice
, pp. 105-139
-
-
Standaert, F.-X.1
Pereira, O.2
Yu, Y.3
Quisquater, J.-J.4
Yung, M.5
Oswald, E.6
-
36
-
-
21144435120
-
Decorrelation: A theory for block cipher security
-
Serge Vaudenay. Decorrelation: A theory for block cipher security. J. Cryptology, 16(4):249-286, 2003.
-
(2003)
J. Cryptology
, vol.16
, Issue.4
, pp. 249-286
-
-
Vaudenay, S.1
|