2015
DOI: 10.1007/978-3-319-17470-9_5
|View full text |Cite
|
Sign up to set email alerts
|

Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy

Abstract: Leakage-resilient cryptography builds systems that withstand partial adversary knowledge of secret state. Ideally, leakage-resilient systems withstand current and future attacks; restoring confidence in the security of implemented cryptographic systems. Understanding the relation between classes of leakage functions is an important aspect.In this work, we consider the memory leakage model, where the leakage class contains functions over the system's entire secret state. Standard classes include functions with … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…However, strict comparisons with these previous works is not possible due to their different leakage models. In particular, as recently discussed in [10], simulatable leakage and bounded leakage are not implied by each other.…”
Section: Security Of Mac1mentioning
confidence: 79%
“…However, strict comparisons with these previous works is not possible due to their different leakage models. In particular, as recently discussed in [10], simulatable leakage and bounded leakage are not implied by each other.…”
Section: Security Of Mac1mentioning
confidence: 79%
“…The analysis is made in the ideal permutation model since there is no other choice at present (see Section 3.4), and we naturally focus on oracle-free leakage functions-as in [YSPY10] and in the concurrent work [DM19]. As a compensation for this idealized analysis, all results are obtained under the weakest and easiest to validate leakage assumption, namely non-invertibility [FH15]. Building upon these, we prove security bounds that are expressive and easy-to-understand, translating to the classical ≈ 2 c/2 bound.…”
Section: Can We Design a Single-pass Leakage-resistant Ae Mode And Hmentioning
confidence: 99%
“…They investigate the security of the keyed duplex construction based on this assumption, and apply their methodology to ISAP and other schemes, focusing on confidentiality in the setting of nonce respecting and encryption leaking. Anticipating on the discussions below, our analysis of the keyed sponge construction is based on a strictly weaker assumption of hard-to-invert leakage (see [FH15]). This leads to a slightly more complicated security analysis, and it is certainly interesting to be able to compare the two approaches.…”
Section: Introductionmentioning
confidence: 99%