Secure communication channels are typically constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties and establishes shared secret keys, and a secure data transmission layer, which uses the secret keys to encrypt data. We address the partial leakage of communicating parties' long-term secret keys due to various side-channel attacks, and the partial leakage of plaintext due to data compression. Both issues can negatively affect the security of channel establishment and data transmission. In this work, we advance the modelling of security for AKE protocols by considering more granular partial leakage of parties' long-term secrets. We present generic and concrete constructions of two-pass lea...
Secure channel protocols protect data transmission over a network from being overheard or tampered w...
We present a new approach to construct several leakage-resilient cryptographic primitives, including...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
Typically, secure channels are constructed from an authenticated key exchange (AKE) protocol, which ...
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to...
Leakage attacks, including various kinds of side-channel attacks, allow an attacker to learn partial...
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to...
Side-channel attacks are severe type of attack against implementation of cryptographic primitives. L...
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to...
Authenticated Key Exchange (AKE) protocols allow two (or multiple) parties to authenticate each othe...
Side-channel attacks are severe type of attack against implementation of cryptographic primitives. L...
Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications...
Leakage attacks, including various kinds of side-channel attacks, allow an attacker to learn partial...
In leakage resilient cryptography, leakage resilient key exchange protocols are constructed to defen...
At CCS 2015, Pereira et al. introduced a pragmatic model enabling the study of leakage-resilient sym...
Secure channel protocols protect data transmission over a network from being overheard or tampered w...
We present a new approach to construct several leakage-resilient cryptographic primitives, including...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
Typically, secure channels are constructed from an authenticated key exchange (AKE) protocol, which ...
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to...
Leakage attacks, including various kinds of side-channel attacks, allow an attacker to learn partial...
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to...
Side-channel attacks are severe type of attack against implementation of cryptographic primitives. L...
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to...
Authenticated Key Exchange (AKE) protocols allow two (or multiple) parties to authenticate each othe...
Side-channel attacks are severe type of attack against implementation of cryptographic primitives. L...
Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications...
Leakage attacks, including various kinds of side-channel attacks, allow an attacker to learn partial...
In leakage resilient cryptography, leakage resilient key exchange protocols are constructed to defen...
At CCS 2015, Pereira et al. introduced a pragmatic model enabling the study of leakage-resilient sym...
Secure channel protocols protect data transmission over a network from being overheard or tampered w...
We present a new approach to construct several leakage-resilient cryptographic primitives, including...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...