期刊文献+

抗泄漏密码学中泄漏模型的研究 被引量:2

Research on leakage models in leakage-resilient cryptography
下载PDF
导出
摘要 边信道攻击利用边信道来危害传统密码学方案的安全性,抗泄漏密码学的研究则可以抵抗这种攻击。安全的抗泄漏密码学方案的设计必须在一个合适的泄漏模型中。文中介绍了目前存在的几种主要的泄漏模型,包括计算泄漏、相对泄漏模型、有界恢复模型、持续泄漏模型、事后泄漏模型等,并论述了各个模型下的一些主要的研究成果和研究进展。 Side-channel attacks scheme. The research on leakage use side channels to endanger the safety of traditional cryptography -resilient cryptography can capture the attacks. A suitable leakage model is necessary for the design of safe leakage-resilient cryptography scheme. Several main leakage models at present are introduced in this paper, including only computation leaks information, the relative-leakage model, the bounded-retrieval model, continual leakage etc. Some main research results and research progress in every model are also discussed on.
作者 滕美林
出处 《信息技术》 2014年第11期31-33,38,共4页 Information Technology
基金 国家自然科学基金项目(61272542)
关键词 边信道攻击 抗泄漏密码学 泄漏模型 密码学方案 side-channel attacks leakage-resilient cryptography leakage model cryptography scheme
  • 相关文献

参考文献35

  • 1Halderman J A,Schoen S D,Heninger N,et al.Lest we remember:Cold boot attacks on encryption keys[J].Communications of the ACM,2009,52(5):91-98.
  • 2Kocher P C.Timing attacks on implementations of Diffie-Hellman,RSA,DSS,and other systems[J].CRYPTO,1996(1109):104-113.
  • 3Quisquater J-J,Samyde D.Electromagnetic analysis(ema):Measures and counter-measures for smart cards[J].E-smart,2001(2140):200-210.
  • 4Gandolfi K,Mourtel C,Olivier F.Electromagnetic analysis:Concrete results[J].CHES,2001(2162):251-261.
  • 5Kocher P C,Jaffe J,Jun B.Differential power analysis[J].CRYPTO,1999(1666):388-397.
  • 6Boneh D,De Millo R A,Lipton R J.On the importance of checking cryptographic protocols for faults(extended abstract)[J].EUROCRYPT,1997(1233):37-51.
  • 7Micali S,Reyzin L.Physically observable cryptography(extended abstract)[J].TCC,2004(2951):278-296.
  • 8Dziembowski S,Pietrzak K.Leakage-resilient cryptography[J].Proceedings of the 49th Annual IEEE Symosium on Foundations of Computer Science,2008:293-302.
  • 9Pietrzak K.A leakage-resilient mode of operation[J].Advances in Cryptology-EUROCRYPT,2009(5479):462-482.
  • 10Faust S,Kiltz E,Pietrzak K,et al.Leakage-resilient signatures[J].Proceedings of the 7th Theory of Cryptography Conference,2010(5978):343-360.

同被引文献5

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部