We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Our model of subversion generalizes previous work in several directions, and is inspired by the proliferation of software attacks (e.g., malware and buffer overflow attacks), and by the recent revelations of Edward Snowden about intelligence agencies trying to surreptitiously sabotage cryptographic algorithms. The main security requirement we put forward demands that a signature scheme should remain unforgeable even in the presence of an attacker applying SAs (within a certain class of allowed attacks) in a fully-adaptive and continuous fashion. Previous notions—e.g., the notion of security against algorithm-substitution attacks introduced by B...
We seek constructions of general-purpose immunizers that take arbitrary cryptographic primitives, an...
Leakage-resilient cryptography tries to design algorithms that are provably secure against side-chan...
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not ...
We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Ou...
We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Ou...
In the aftermath of the Snowden revelations in 2013, concerns about the integrity and security of cr...
Side-channel attacks allow the adversary to gain partial knowledge of the secret key when cryptograp...
International audienceLeakage-resilient cryptography aims at capturing side-channel attacks within t...
Algorithm substitution attack (ASA) on signatures can have severe consequences as the authentication...
We present the first chosen-ciphertext secure public-key encryption schemes resilient to continuous ...
Abstract. Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forw...
We construct new leakage-resilient signature schemes. Our schemes remain unforgeable against an adve...
Restoring the security of maliciously implemented cryptosystems has been widely considered challengi...
We revisit the question of constructing public-key encryption and signature schemes with security in...
Leakage-resilient cryptosystems aim to maintain security in situations where their implementation le...
We seek constructions of general-purpose immunizers that take arbitrary cryptographic primitives, an...
Leakage-resilient cryptography tries to design algorithms that are provably secure against side-chan...
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not ...
We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Ou...
We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Ou...
In the aftermath of the Snowden revelations in 2013, concerns about the integrity and security of cr...
Side-channel attacks allow the adversary to gain partial knowledge of the secret key when cryptograp...
International audienceLeakage-resilient cryptography aims at capturing side-channel attacks within t...
Algorithm substitution attack (ASA) on signatures can have severe consequences as the authentication...
We present the first chosen-ciphertext secure public-key encryption schemes resilient to continuous ...
Abstract. Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forw...
We construct new leakage-resilient signature schemes. Our schemes remain unforgeable against an adve...
Restoring the security of maliciously implemented cryptosystems has been widely considered challengi...
We revisit the question of constructing public-key encryption and signature schemes with security in...
Leakage-resilient cryptosystems aim to maintain security in situations where their implementation le...
We seek constructions of general-purpose immunizers that take arbitrary cryptographic primitives, an...
Leakage-resilient cryptography tries to design algorithms that are provably secure against side-chan...
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not ...