Incompressibility is a popular security notion for white-box cryptography and captures that a large encryption program cannot be compressed without losing functionality. Fouque, Karpman, Kirchner and Minaud (FKKM) defined strong incompressibility, where a compressed program should not even help to distinguish encryptions of two messages of equal length. Equivalently, the notion can be phrased as indistinguishability under chosen-plaintext attacks and key-leakage (LK-IND-CPA), where the leakage rate is high.In this paper, we show that LK-IND-CPA security with superlogarithmic-length leakage, and thus strong incompressibility, cannot be proven under standard (i.e. single-stage) assumptions, if the encryption scheme is key-fixing, i.e. a polyn...
222 pagesIn this work, we examine the science of proving formal security of primitives in cryptograp...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...
The original publication is available at www.springerlink.comInternational audienceSymbolic and comp...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
White-box cryptography (WBC) for secure pseudorandom permutations (block ciphers) is known as an uns...
Much recent work in cryptography attempts to build secure schemes in the presence of side-channel le...
We construct three public key knapsack cryptosystems. Standard knapsack cryptosystems hide easy inst...
Abstract. We propose generic constructions of public-key encryption schemes, satisfying key-dependen...
International audienceWe present new constructions of leakage-resilient cryptosystems, which remain ...
Leakage-resilient cryptography aims at formally proving the security of cryptographic implementation...
In this thesis, we present constructions of leakage-resilient cryptographic primitives, and we give ...
Side-channel attacks allow the adversary to gain partial knowledge of the secret key when cryptograp...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
This thesis studies the limitations of incompressible encodings with information- theoretic security...
222 pagesIn this work, we examine the science of proving formal security of primitives in cryptograp...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...
The original publication is available at www.springerlink.comInternational audienceSymbolic and comp...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
White-box cryptography (WBC) for secure pseudorandom permutations (block ciphers) is known as an uns...
Much recent work in cryptography attempts to build secure schemes in the presence of side-channel le...
We construct three public key knapsack cryptosystems. Standard knapsack cryptosystems hide easy inst...
Abstract. We propose generic constructions of public-key encryption schemes, satisfying key-dependen...
International audienceWe present new constructions of leakage-resilient cryptosystems, which remain ...
Leakage-resilient cryptography aims at formally proving the security of cryptographic implementation...
In this thesis, we present constructions of leakage-resilient cryptographic primitives, and we give ...
Side-channel attacks allow the adversary to gain partial knowledge of the secret key when cryptograp...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
This thesis studies the limitations of incompressible encodings with information- theoretic security...
222 pagesIn this work, we examine the science of proving formal security of primitives in cryptograp...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...
The original publication is available at www.springerlink.comInternational audienceSymbolic and comp...