A survey of leakage-resilient cryptography
In the past 15 years, cryptography has made considerable progress in expanding the
adversarial attack model to cover side-channel attacks and has built schemes to provably …
adversarial attack model to cover side-channel attacks and has built schemes to provably …
Subversion-resilient signature schemes
We provide a formal treatment of security of digital signatures against subversion attacks
(SAs). Our model of subversion generalizes previous work in several directions, and is …
(SAs). Our model of subversion generalizes previous work in several directions, and is …
[PDF][PDF] 侧信道攻击与防御技术研究进展
王永娟, 樊昊鹏, 代政一, 袁庆军, 王相宾 - 计算机学报, 2023 - 159.226.43.17
摘要侧信道攻击利用密码实现的物理泄露而不是理论弱点来恢复密钥, 对密码系统的安全实现有
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …
Efficient non-malleable codes and key derivation for poly-size tampering circuits
Non-malleable codes, defined by Dziembowski, Pietrzak, and Wichs (ICS'10), provide
roughly the following guarantee: if a codeword c encoding some message x is tampered to …
roughly the following guarantee: if a codeword c encoding some message x is tampered to …
Revisiting non-malleable secret sharing
A threshold secret sharing scheme (with threshold t) allows a dealer to share a secret
among a set of parties such that any group of t or more parties can recover the secret and no …
among a set of parties such that any group of t or more parties can recover the secret and no …
From single-bit to multi-bit public-key encryption via non-malleable codes
One approach towards basing public-key encryption (PKE) schemes on weak and credible
assumptions is to build “stronger” or more general schemes generically from “weaker” or …
assumptions is to build “stronger” or more general schemes generically from “weaker” or …
Non-malleable codes from average-case hardness:, decision trees, and streaming space-bounded tampering
We show a general framework for constructing non-malleable codes against tampering
families with average-case hardness bounds. Our framework adapts ideas from the Naor …
families with average-case hardness bounds. Our framework adapts ideas from the Naor …
Leakage-resilient non-malleable codes
A recent trend in cryptography is to construct cryptosystems that are secure against physical
attacks. Such attacks are usually divided into two classes: the leakage attacks in which the …
attacks. Such attacks are usually divided into two classes: the leakage attacks in which the …
Locally decodable and updatable non-malleable codes and their applications
Non-malleable codes, introduced as a relaxation of error-correcting codes by Dziembowski,
Pietrzak, and Wichs (ICS'10), provide the security guarantee that the message contained in …
Pietrzak, and Wichs (ICS'10), provide the security guarantee that the message contained in …
Block-wise non-malleable codes
Non-malleable codes, introduced by Dziembowski, Pietrzak, and Wichs (ICS'10) provide the
guarantee that if a codeword c of a message m, is modied by a tampering function f to c' …
guarantee that if a codeword c of a message m, is modied by a tampering function f to c' …