Strong authenticated key exchange with auxiliary inputs
Leakage attacks, including various kinds of side-channel attacks, allow an attacker to learn partial information about the internal secrets such as the secret key and the randomness of a cryptographic system. Designing a strong, meaningful, yet achievable security notion to capture practical leakage...
Saved in:
Main Authors: | CHEN, Rongmao, MU, Yi, YANG, Guomin, SUSILO, Willy, GUO, Fuchun |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2017
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7371 https://ink.library.smu.edu.sg/context/sis_research/article/8374/viewcontent/s10623_016_0295_3.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Strongly leakage-resilient authenticated key exchange
by: CHEN, Rongmao, et al.
Published: (2016) -
Leakage resilient authenticated key exchange secure in the auxiliary input model
by: YANG, Guomin, et al.
Published: (2013) -
Strongly leakage resilient authenticated key exchange, revisited
by: YANG, Guomin, et al.
Published: (2019) -
One-round strong oblivious signature-based envelope
by: CHEN, Rongmao, et al.
Published: (2016) -
A new general framework for secure public key encryption with keyword search
by: CHEN, Rongmao, et al.
Published: (2015)