We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,713 results
  1. Forward Security Under Leakage Resilience, Revisited

    As both notions employ the same key-evolution paradigm, Bellare et al. (CANS 2017) study combining forward security with leakage resilience. The idea...
    Suvradip Chakraborty, Harish Karthikeyan, ... C. Pandu Rangan in Cryptology and Network Security
    Conference paper 2023
  2. More Efficient Public-Key Cryptography with Leakage and Tamper Resilience

    In this paper, we study the design of efficient signature and public-key encryption (PKE) schemes in the presence of both leakage and tampering...
    Shuai Han, Shengli Liu, Dawu Gu in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  3. (Full) Leakage resilience of Fiat-Shamir signatures over lattices

    Fiat-Shamir is a mainstream construction paradigm of lattice-based signature schemes. While its theoretical security is well-studied, its...

    Yuejun Liu, Yongbin Zhou, ... Yang Tao in Frontiers of Computer Science
    Article 08 January 2022
  4. New Bounds on the Local Leakage Resilience of Shamir’s Secret Sharing Scheme

    We study the local leakage resilience of Shamir’s secret sharing scheme. In Shamir’s scheme, a random polynomial f of degree t is sampled over a...
    Ohad Klein, Ilan Komargodski in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  5. Leakage-Tolerant Circuits

    A leakage-resilient circuit for \(f:\{0,1\}^n\rightarrow \{0,1\}^m\)...
    Yuval Ishai, Yifan Song in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  6. Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience

    Deniable encryption (Canetti et al. in CRYPTO ’97) is an intriguing primitive, which provides security guarantee against coercion by allowing a...
    Zhiyuan An, Haibo Tian, ... Fangguo Zhang in Computer Security – ESORICS 2023
    Conference paper 2024
  7. Leakage-resilient identity-based cryptography from minimal assumptions

    Identity-based hash proof system (IB-HPS), a variant of hash proof system (HPS) in the identity-based setting, is a useful building block in...

    Yanwei Zhou, Bo Yang, ... Yi Mu in Designs, Codes and Cryptography
    Article 16 August 2023
  8. Stronger Lower Bounds for Leakage-Resilient Secret Sharing

    Threshold secret sharing allows a dealer to split a secret s into n shares, such that any t shares allow for reconstructing s, but no...
    Charlotte Hoffmann, Mark Simkin in Progress in Cryptology – LATINCRYPT 2023
    Conference paper 2023
  9. Lightweight Leakage-Resilient PRNG from TBCs Using Superposition

    In this paper, we propose a leakage-resilient pseudo-random number generator (PRNG) design that leverages the rekeying techniques of the PSV-Enc...
    Mustafa Khairallah, Srinivasan Yadhunathan, Shivam Bhasin in Constructive Side-Channel Analysis and Secure Design
    Conference paper 2024
  10. Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family

    Motivated by leakage-resilient secure computation of circuits with addition and multiplication gates, this work studies the leakage-resilience of...
    Hemanta K. Maji, Hai H. Nguyen, ... Albert Yu in Theory of Cryptography
    Conference paper 2022
  11. Combined Fault and Leakage Resilience: Composability, Constructions and Compiler

    Real-world cryptographic implementations nowadays are not only attacked via classical cryptanalysis but also via implementation attacks, including...
    Sebastian Berndt, Thomas Eisenbarth, ... Okan Seker in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  12. Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding

    In this work, we present two generic frameworks for leakage-resilient attribute-based encryption (ABE), which is an improved version of ABE that can...
    Yijian Zhang, Yunhao Ling, ... Lu** Wang in Information Security and Cryptology – ICISC 2023
    Conference paper 2024
  13. On the Local Leakage Resilience of Linear Secret Sharing Schemes

    We consider the following basic question: to what extent are standard secret sharing schemes and protocols for secure multiparty computation that...

    Fabrice Benhamouda, Akshay Degwekar, ... Tal Rabin in Journal of Cryptology
    Article 09 February 2021
  14. Tracing the evolution of cyber resilience: a historical and conceptual review

    In 2000, during a time when cyber security research was focused on the risks and threats posed by digital systems, the notion of being able to...

    Vasiliki Tzavara, Savvas Vassiliadis in International Journal of Information Security
    Article Open access 01 February 2024
  15. Leakage Sources of the ICLooPUF: Analysis of a Side-Channel Protected Oscillator-Based PUF

    In the last years, Physical Unclonable Functions (PUFs) became a popular security primitive, which is nowadays also used in several products. As a...
    Conference paper 2024
  16. Leakage-Resilient \(\mathsf {IBE}\) / \(\mathsf {ABE}\) with Optimal Leakage Rates from Lattices

    We derive the first adaptively secure \(\mathsf {IBE}\)...
    Qiqi Lai, Feng-Hao Liu, Zhedong Wang in Public-Key Cryptography – PKC 2022
    Conference paper 2022
  17. Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking

    Symmetric ciphers operating in (small or mid-size) prime fields have been shown to be promising candidates to maintain security against low-noise (or...
    Sebastian Faust, Loïc Masure, ... François-Xavier Standaert in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  18. Learn from Your Faults: Leakage Assessment in Fault Attacks Using Deep Learning

    Generic vulnerability assessment of cipher implementations against Fault Attacks (FA) is a largely unexplored research area. Security assessment...

    Sayandeep Saha, Manaar Alam, ... Pallab Dasgupta in Journal of Cryptology
    Article 09 May 2023
  19. ZK-PCPs from Leakage-Resilient Secret Sharing

    Zero-Knowledge PCPs (ZK-PCPs; Kilian, Petrank, and Tardos, STOC ‘97) are PCPs with the additional zero-knowledge guarantee that the view of any...

    Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss in Journal of Cryptology
    Article 25 July 2022
Did you find what you were looking for? Share feedback.