메뉴 건너뛰기




Volumn , Issue , 2010, Pages 141-151

Practical leakage-resilient pseudorandom generators

Author keywords

Algorithms; Design; Security

Indexed keywords

CRYPTOGRAPHIC FUNCTIONS; CRYPTOGRAPHIC OPERATIONS; CRYPTOGRAPHIC SYSTEMS; CURRENT RESEARCHES; FIRST CONSTRUCTIONS; HARDWARE AND SOFTWARE; INTERNET SECURITY; LEAKAGE-RESILIENCE; METHODOLOGICAL CONTRIBUTIONS; OPEN ENVIRONMENT; PRACTICAL IMPLEMENTATION; PSEUDORANDOM GENERATORS; RANDOM ORACLE; REINITIALIZATION; SECURE COMMUNICATIONS; SECURITY; SIDE CHANNEL ATTACK; STREAM CIPHERS; THE STANDARD MODEL; THEORY AND PRACTICE;

EID: 78650013814     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866307.1866324     Document Type: Conference Paper
Times cited : (68)

References (37)
  • 1
    • 70350627587 scopus 로고    scopus 로고
    • Simultaneous hardcore bits and cryptography against memory attacks
    • Omer Reingold, editor, TCC. Springer
    • Adi Akavia, Shaff Goldwasser, and Vinod Vaikuntanathan. Simultaneous hardcore bits and cryptography against memory attacks. In Omer Reingold, editor, TCC, volume 5444 of Lecture Notes in Computer Science, pages 474-495. Springer, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5444 , pp. 474-495
    • Akavia, A.1    Goldwasser, S.2    Vaikuntanathan, V.3
  • 2
    • 84937438279 scopus 로고    scopus 로고
    • Power analysis, what is now possible
    • Proceedings of ASIACRYPT 2001, Kyoto, Japan, dec
    • M.L. Akkar, R. Bévan, P. Dischamp, and D. Moyart. Power analysis, what is now possible. . . . In Proceedings of ASIACRYPT 2001, volume 1976 of LNCS, pages 489-502, Kyoto, Japan, dec 2001.
    • (2001) LNCS , vol.1976 , pp. 489-502
    • Akkar, M.L.1    Bévan, R.2    Dischamp, P.3    Moyart, D.4
  • 3
    • 84873365626 scopus 로고    scopus 로고
    • Leakage-resilient public-key cryptography in the bounded-retrieval model
    • Joël Alwen, Yevgeniy Dodis, and Daniel Wichs. Leakage-resilient public-key cryptography in the bounded-retrieval model. In Halevi [14], pages 36-54.
    • Halevi , vol.14 , pp. 36-54
    • Alwen, J.1    Dodis, Y.2    Wichs, D.3
  • 4
    • 78650016796 scopus 로고    scopus 로고
    • Memory leakage-resilient encryption based on physically unclonable functions
    • Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, and Pim Tuyls. Memory leakage-resilient encryption based on physically unclonable functions. In Matsui [22], pages 685-702.
    • Matsui , vol.22 , pp. 685-702
    • Armknecht, F.1    Maes, R.2    Sadeghi, A.-R.3    Sunar, B.4    Tuyls, P.5
  • 5
    • 33745629609 scopus 로고    scopus 로고
    • Perfectly secure password protocols in the bounded retrieval model
    • Shai Halevi and Tal Rabin, Editors, Third Theory of Cryptography Conference, TCC 2006. Springer
    • Giovanni Di Crescenzo, Richard J. Lipton, and Shabsi Walfish. Perfectly secure password protocols in the bounded retrieval model. In Shai Halevi and Tal Rabin, editors, Third Theory of Cryptography Conference, TCC 2006, volume 3876 of Lecture Notes in Computer Science, pages 225-244. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.3876 , pp. 225-244
    • Di Crescenzo, G.1    Lipton, R.J.2    Walfish, S.3
  • 6
    • 70350674336 scopus 로고    scopus 로고
    • On cryptography with auxiliary input
    • Bethesda, Maryland, jun. ACM
    • Y. Dodis, Y. Tauman Kalai, and S. Lovett. On cryptography with auxiliary input. In Proceedings of STOC 2009, pages 621-630, Bethesda, Maryland, jun 2009. ACM.
    • (2009) Proceedings of STOC 2009 , pp. 621-630
    • Dodis, Y.1    Tauman Kalai, Y.2    Lovett, S.3
  • 8
    • 33745532541 scopus 로고    scopus 로고
    • Intrusion-resilience via the bounded-storage model
    • Shai Halevi and Tal Rabin, editors, Third Theory of Cryptography Conference, TCC 2006. Springer
    • Stefan Dziembowski. Intrusion-resilience via the bounded-storage model. In Shai Halevi and Tal Rabin, editors, Third Theory of Cryptography Conference, TCC 2006, volume 3876 of Lecture Notes in Computer Science, pages 207-224. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.3876 , pp. 207-224
    • Dziembowski, S.1
  • 9
    • 57949107348 scopus 로고    scopus 로고
    • Leakage-resilient cryptography
    • IEEE Computer Society
    • Stefan Dziembowski and Krzysztof Pietrzak. Leakage-resilient cryptography. In FOCS, pages 293-302. IEEE Computer Society, 2008.
    • (2008) FOCS , pp. 293-302
    • Dziembowski, S.1    Pietrzak, K.2
  • 11
    • 77949638234 scopus 로고    scopus 로고
    • Protecting circuits from computationally-bounded leakage
    • Report 2009/379
    • Sebastian Faust, Leonid Reyzin, and Eran Tromer. Protecting circuits from computationally-bounded leakage. Cryptology ePrint Archive, Report 2009/379, 2009. http://eprint.iacr.org/.
    • (2009) Cryptology EPrint Archive
    • Faust, S.1    Reyzin, L.2    Tromer, E.3
  • 12
  • 14
    • 78650029533 scopus 로고    scopus 로고
    • Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings. Springer
    • Shai Halevi, editor. Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, volume 5677 of Lecture Notes in Computer Science. Springer, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5677
    • Halevi, S.1
  • 15
    • 40249089887 scopus 로고    scopus 로고
    • On seed-incompressible functions
    • Ran Canetti, editor, TCC. Springer
    • Shai Halevi, Steven Myers, and Charles Rackoff. On seed-incompressible functions. In Ran Canetti, editor, TCC, volume 4948 of Lecture Notes in Computer Science, pages 19-36. Springer, 2008.
    • (2008) Lecture Notes in Computer Science , vol.4948 , pp. 19-36
    • Halevi, S.1    Myers, S.2    Rackoff, C.3
  • 16
    • 0345253860 scopus 로고    scopus 로고
    • A pseudorandom generator from any one-way function
    • Johan Håstad, Russell Impagliazzo, Leonid A. Levin, and Michael Luby. A pseudorandom generator from any one-way function. SIAM J. Comput., 28(4):1364-1396, 1999.
    • (1999) SIAM J. Comput. , vol.28 , Issue.4 , pp. 1364-1396
    • Håstad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 17
    • 78650030960 scopus 로고    scopus 로고
    • Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings. Springer
    • Antoine Joux, editor. Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, volume 5479 of Lecture Notes in Computer Science. Springer, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5479
    • Joux, A.1
  • 18
    • 24144444705 scopus 로고    scopus 로고
    • Fox : A new family of block ciphers
    • Helena Handschuh and M. Anwar Hasan, editors, Selected Areas in Cryptography. Springer
    • Pascal Junod and Serge Vaudenay. Fox : A new family of block ciphers. In Helena Handschuh and M. Anwar Hasan, editors, Selected Areas in Cryptography, volume 3357 of Lecture Notes in Computer Science, pages 114-129. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3357 , pp. 114-129
    • Junod, P.1    Vaudenay, S.2
  • 19
    • 78650011648 scopus 로고    scopus 로고
    • Signature schemes with bounded leakage resilience
    • Jonathan Katz and Vinod Vaikuntanathan. Signature schemes with bounded leakage resilience. In Matsui [22], pages 703-720.
    • Matsui , vol.22 , pp. 703-720
    • Katz, J.1    Vaikuntanathan, V.2
  • 20
    • 77952362571 scopus 로고    scopus 로고
    • Leak resistant cryptographic indexed key update
    • US Patent 6539092
    • P. Kocher. Leak resistant cryptographic indexed key update. US Patent 6539092.
    • Kocher, P.1
  • 21
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Michael J. Wiener, editor, CRYPTO. Springer
    • Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Differential power analysis. In Michael J. Wiener, editor, CRYPTO, volume 1666 of Lecture Notes in Computer Science, pages 388-397. Springer, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 22
    • 78649999448 scopus 로고    scopus 로고
    • Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings. Springer
    • Mitsuru Matsui, editor. Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, volume 5912 of Lecture Notes in Computer Science. Springer, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5912
    • Matsui, M.1
  • 23
    • 35048852134 scopus 로고    scopus 로고
    • Physically observable cryptography (extended abstract)
    • Moni Naor, editor, TCC. Springer
    • Silvio Micali and Leonid Reyzin. Physically observable cryptography (extended abstract). In Moni Naor, editor, TCC, volume 2951 of Lecture Notes in Computer Science, pages 278-296. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2951 , pp. 278-296
    • Micali, S.1    Reyzin, L.2
  • 24
    • 78649996936 scopus 로고    scopus 로고
    • Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings. Springer
    • Daniele Micciancio, editor. Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings, volume 5978 of Lecture Notes in Computer Science. Springer, 2010.
    • (2010) Lecture Notes in Computer Science , vol.5978
    • Micciancio, D.1
  • 25
    • 78650812710 scopus 로고    scopus 로고
    • Public-key cryptosystems resilient to key leakage
    • Moni Naor and Gil Segev. Public-key cryptosystems resilient to key leakage. In Halevi [14], pages 18-35.
    • Halevi , vol.14 , pp. 18-35
    • Naor, M.1    Segev, G.2
  • 26
    • 84937420653 scopus 로고    scopus 로고
    • Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case
    • Advances in Cryptology - CRYPTO 2002. Springer
    • Jesper Buus Nielsen. Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. In Advances in Cryptology - CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 111-126. Springer, 2002.
    • Lecture Notes in Computer Science , vol.2442 , Issue.2002 , pp. 111-126
    • Nielsen, J.B.1
  • 28
    • 77952354675 scopus 로고    scopus 로고
    • A block cipher based pseudo random number generator secure against side-channel key recovery
    • Masayuki Abe and Virgil D. Gligor, Editors. ACM
    • Christophe Petit, François-Xavier Standaert, Olivier Pereira, Tal Malkin, and Moti Yung. A block cipher based pseudo random number generator secure against side-channel key recovery. In Masayuki Abe and Virgil D. Gligor, editors, ASIACCS, pages 56-65. ACM, 2008.
    • (2008) ASIACCS , pp. 56-65
    • Petit, C.1    Standaert, F.-X.2    Pereira, O.3    Malkin, T.4    Yung, M.5
  • 29
    • 78650011944 scopus 로고    scopus 로고
    • A leakage-resilient mode of operation
    • Krzysztof Pietrzak. A leakage-resilient mode of operation. In Joux [17], pages 462-482.
    • Joux , vol.17 , pp. 462-482
    • Pietrzak, K.1
  • 30
    • 33746082293 scopus 로고    scopus 로고
    • Eddy current for magnetic analysis with active sensor
    • Nice, France
    • Jean-Jacques Quisquater and David Samyde. Eddy current for Magnetic Analysis with Active Sensor. In Esmart 2002, Nice, France, 2002.
    • (2002) Esmart 2002
    • Quisquater, J.-J.1    Samyde, D.2
  • 31
    • 78649989280 scopus 로고    scopus 로고
    • Algebraic side-channel attacks
    • to appear in the proceedings of Inscrypt 2009, Behing, China, December. Springer, Cryptology ePrint Archive, Report 2009/279
    • M. Renauld and F.-X. Standaert. Algebraic side-channel attacks. to appear in the proceedings of Inscrypt 2009, Lecture Notes in Computer Science, Behing, China, December 2009, Springer, Cryptology ePrint Archive, Report 2009/279. http://eprint.iacr.org/2009/279.
    • (2009) Lecture Notes in Computer Science
    • Renauld, M.1    Standaert, F.-X.2
  • 32
    • 70350576829 scopus 로고    scopus 로고
    • Algebraic side-channel attacks on the aes: Why time also matters in dpa
    • Proceedings of CHES 2009, Lausanne, Switzerland, sep. Springer
    • M. Renauld, F.-X. Standaert, and N. Veyrat-Charvillon. Algebraic side-channel attacks on the aes: Why time also matters in dpa. In Proceedings of CHES 2009, volume 5746 of LNCS, pages 97-111, Lausanne, Switzerland, sep 2009. Springer.
    • (2009) LNCS , vol.5746 , pp. 97-111
    • Renauld, M.1    Standaert, F.-X.2    Veyrat-Charvillon, N.3
  • 33
    • 78649998330 scopus 로고    scopus 로고
    • A unified framework for the analysis of side-channel key recovery attacks
    • François-Xavier Standaert, Tal Malkin, and Moti Yung. A unified framework for the analysis of side-channel key recovery attacks. In Joux [17], pages 443-461.
    • Joux , vol.17 , pp. 443-461
    • Standaert, F.-X.1    Malkin, T.2    Yung, M.3
  • 34
    • 77955866745 scopus 로고    scopus 로고
    • How leaky is an extractor?
    • the proceedings of LatinCrypt 2010, Puebla, Mexico, August
    • Francois-Xavier Standaert. How leaky is an extractor? in the proceedings of LatinCrypt 2010, Lecture Notes in Computer Science, vol 6212, Puebla, Mexico, August 2010.
    • (2010) Lecture Notes in Computer Science , vol.6212
    • Standaert, F.-X.1
  • 36
    • 21144435120 scopus 로고    scopus 로고
    • Decorrelation: A theory for block cipher security
    • Serge Vaudenay. Decorrelation: A theory for block cipher security. J. Cryptology, 16(4):249-286, 2003.
    • (2003) J. Cryptology , vol.16 , Issue.4 , pp. 249-286
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.