Download now Free registration required
In the continual memory leakage model, security against attackers who can repeatedly obtain leakage is achieved by periodically updating the secret key. This is an appealing model which captures a wide class of side-channel attacks, but all previous constructions in this model provide only a very minimal amount of leakage tolerance during secret key updates. Since key updates may happen frequently, improving security guarantees against attackers who obtain leakage during these updates is an important problem. In this work, the authors present the first cryptographic primitives which are secure against a super-logarithmic amount of leakage during secret key updates.
- Format: PDF
- Size: 422.1 KB