It is notoriously difficult to create hardware that is immune from side channel and tampering attacks. A lot of recent literature, therefore, has instead considered \emph{algorithmic} defenses from such attacks. In this paper, we show how to algorithmically secure any cryptographic functionality from continual split-state leakage and tampering attacks. A split-state attack on cryptographic hardware is one that targets separate parts of the hardware separately. Our construction does not require the hardware to have access to randomness. In contrast, prior work on protecting from continual combined leakage and tampering required true randomness for each update. Our construction is in the common reference string (CRS) model; the CRS must be h...
Non-malleable codes provide a useful and meaningful security guarantee in situations where tra-ditio...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
Securing cryptographic systems in the presence of side-channel leakages is still an important proble...
Abstract. It is notoriously difficult to create hardware that is immune from side channel and tamper...
Non-malleable codes for the split-state model allow to encode a message into two parts, such that ar...
In this thesis, we present constructions of leakage-resilient cryptographic primitives, and we give ...
Non-malleable codes for the split-state model allow to encode a message into two parts, such that ar...
A recent trend in cryptography is to construct cryptosystems that are secure against physical attack...
Tampering attack is the act of deliberately modifying the codeword to produce another codeword of a...
Leakage-resilient cryptography aims at formally proving the security of cryptographic implementation...
Non-malleable codes (Dziembowski et al., ICS’10 and J. ACM’18) are a natural relaxation of error cor...
In this report, we are concerned with models to analyze the security of cryptographic algorithms aga...
We revisit the question of constructing public-key encryption and signature schemes with security in...
We present a compiler that converts any circuit into one that remains secure even if a constant frac...
Physical cryptographic devices inadvertently leak information through numerous side-channels. Such l...
Non-malleable codes provide a useful and meaningful security guarantee in situations where tra-ditio...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
Securing cryptographic systems in the presence of side-channel leakages is still an important proble...
Abstract. It is notoriously difficult to create hardware that is immune from side channel and tamper...
Non-malleable codes for the split-state model allow to encode a message into two parts, such that ar...
In this thesis, we present constructions of leakage-resilient cryptographic primitives, and we give ...
Non-malleable codes for the split-state model allow to encode a message into two parts, such that ar...
A recent trend in cryptography is to construct cryptosystems that are secure against physical attack...
Tampering attack is the act of deliberately modifying the codeword to produce another codeword of a...
Leakage-resilient cryptography aims at formally proving the security of cryptographic implementation...
Non-malleable codes (Dziembowski et al., ICS’10 and J. ACM’18) are a natural relaxation of error cor...
In this report, we are concerned with models to analyze the security of cryptographic algorithms aga...
We revisit the question of constructing public-key encryption and signature schemes with security in...
We present a compiler that converts any circuit into one that remains secure even if a constant frac...
Physical cryptographic devices inadvertently leak information through numerous side-channels. Such l...
Non-malleable codes provide a useful and meaningful security guarantee in situations where tra-ditio...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
Securing cryptographic systems in the presence of side-channel leakages is still an important proble...