Design of Leakage-resilient and Tamper-resilient Encoding Schemes with Provable Security, Ph.D. Dissertation Sharif University of Technology ; Salmasizadeh, Mahmoud (Supervisor) ; Daneshgar, Amir ($item.subfieldsMap.e)
Abstract
Security analysis of cryptographic systems against implementation attacks, including active and passive attacks, is an important issue due to the large number of such attacks in the real world. Since 2000’s, cryptographers have begun attempting to model active and passive attacks to implementation of cryptographic algorithms. At first, cryptographers modeled the attackers with ability to exploit leakaged information, leading to leakage-resilient cryptography. Afterwards, cryptographers modeled the attackers with ability to tamper with the cryptographic algorithms which led to tamper-resilient cryptography. Actually, the major proposed cryptographic primitive dealing with tampering is the...
Cataloging briefDesign of Leakage-resilient and Tamper-resilient Encoding Schemes with Provable Security, Ph.D. Dissertation Sharif University of Technology ; Salmasizadeh, Mahmoud (Supervisor) ; Daneshgar, Amir ($item.subfieldsMap.e)
Abstract
Security analysis of cryptographic systems against implementation attacks, including active and passive attacks, is an important issue due to the large number of such attacks in the real world. Since 2000’s, cryptographers have begun attempting to model active and passive attacks to implementation of cryptographic algorithms. At first, cryptographers modeled the attackers with ability to exploit leakaged information, leading to leakage-resilient cryptography. Afterwards, cryptographers modeled the attackers with ability to tamper with the cryptographic algorithms which led to tamper-resilient cryptography. Actually, the major proposed cryptographic primitive dealing with tampering is the...
Find in contentBookmark
|
|