Browsing Combinatorics and Optimization by Subject "Leakage Resilient"
Now showing items 1-1 of 1
-
On the Security of Leakage Resilient Public Key Cryptography
(University of Waterloo, 2012-04-30)Side channel attacks, where an attacker learns some physical information about the state of a device, are one of the ways in which cryptographic schemes are broken in practice. "Provably secure" schemes are subject to these ...