Zobrazeno 1 - 10
of 426
pro vyhledávání: '"Leakage Resilience"'
Publikováno v:
IEEE Access, Vol 12, Pp 28155-28168 (2024)
By side-channel attacks, a fraction part of secret keys used in cryptographic schemes could be leaked to adversaries. Recently, adversaries have realized practical side-channel attacks so that these existing cryptographic schemes could be broken. Ind
Externí odkaz:
https://doaj.org/article/3e263ab80042440fa0c889bc161900bd
Autor:
Chandranan Dhar, Jordan Ethan, Ravindra Jejurikar, Mustafa Khairallah, Eik List, Sougata Mandal
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 2 (2024)
During recent years, research on authenticated encryption has been thriving through two highly active and practically motivated research directions: provable leakage resilience and key- or context-commitment security. However, the intersection of bot
Externí odkaz:
https://doaj.org/article/8e1541836cb34ba290ba0b2e4a2cd773
Autor:
Patrick Struck, Maximiliane Weishäupl
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 1 (2024)
The main goal of this work is to construct authenticated encryption (AE) hat is both committing and leakage-resilient. As a first approach for this we consider generic composition as a well-known method for constructing AE schemes. While the leakage
Externí odkaz:
https://doaj.org/article/12a597baed314e1f81af2ee19dd6caf5
Autor:
Henk Berendsen, Bart Mennink
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 1 (2024)
Lightweight cryptographic constructions are often optimized on multiple aspects that put the security bounds to the limit. In this respect, it is important to obtain security bounds that are tight and give an accurate and exact indication of the gene
Externí odkaz:
https://doaj.org/article/c0d6b2ff2f64404a95958b22e865562b
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 1 (2023)
This paper presents a provably secure, higher-order, and leakage-resilient (LR) rekeying scheme named LR Rekeying with Random oracle Repetition (LR4), along with a quantitative security evaluation methodology. Many existing LR primitives are based on
Externí odkaz:
https://doaj.org/article/9fb3627577df468fae0b304a2ee81984
Publikováno v:
IEEE Access, Vol 11, Pp 54448-54461 (2023)
Signature can be used to verify the integrity of both a message and the identity of a signer, whereas encryption can be used to ensure the confidentiality of a message. In the past, cryptography researchers have studied and proposed numerous certific
Externí odkaz:
https://doaj.org/article/97c9c84895f24d44b6617f0670e44606
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 4 (2023)
Incompressibility is a popular security notion for white-box cryptography and captures that a large encryption program cannot be compressed without losing functionality. Fouque, Karpman, Kirchner and Minaud (FKKM) defined strong incompressibility, wh
Externí odkaz:
https://doaj.org/article/ff4106cff73147e89c5175de651ebc5c
Publikováno v:
IEEE Open Journal of the Computer Society, Vol 3, Pp 137-148 (2022)
Certificate-based public key cryptography (CB-PKC) removes the problem of certificate management in traditional public key systems and avoids the key escrow problem in identity-based public key systems. In the past, many authenticated key exchange (A
Externí odkaz:
https://doaj.org/article/bea595618c8f484c81bd00ad549b2d05
Publikováno v:
IEEE Access, Vol 10, Pp 104636-104648 (2022)
A multi-recipient signcryption (MRSC) scheme possesses the functionalities of both multi-recipient public-key encryption and digital signature to ensure both integrity and confidentiality of transmitted messages. Moreover, an anonymous MRSC (AMRSC) s
Externí odkaz:
https://doaj.org/article/3879beb749644a6990ee30874686ec29
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.