Paper 2010/154
Efficient Public-Key Cryptography in the Presence of Key Leakage
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt, and Daniel Wichs
Abstract
We study the design of cryptographic primitives resistant to a large class of side-channel attacks, called "memory attacks", where an attacker can repeatedly and adaptively learn information about the secret key, subject *only* to the constraint that the *overall amount* of such information is bounded by some parameter
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- leakage resilienceNIZK simulation extractability
- Contact author(s)
- kkh @ cs nyu edu
- History
- 2010-09-15: last of 2 revisions
- 2010-03-24: received
- See all versions
- Short URL
- https://ia.cr/2010/154
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2010/154, author = {Yevgeniy Dodis and Kristiyan Haralambiev and Adriana Lopez-Alt and Daniel Wichs}, title = {Efficient Public-Key Cryptography in the Presence of Key Leakage}, howpublished = {Cryptology {ePrint} Archive, Paper 2010/154}, year = {2010}, url = {https://eprint.iacr.org/2010/154} }