Главная
Study mode:
on
1
Intro
2
Title
3
The Good News
4
Three Questions
5
Outline
6
Behavior assumptions
7
Standard security notion
8
Restrictions
9
Three Types of Goals
10
No Main Extension
11
Schemes
12
Fictions
13
Loops
14
Internal variables
15
What helps to look at
16
SVT
17
PRF
18
Leakage
19
PRF Split
20
Backside Leakage
Description:
Explore authenticated encryption in the context of protocol and side channel leakage in this 25-minute conference talk presented at Asiacrypt 2017. Delve into the research paper by Guy Barwell, Daniel P. Martin, Elisabeth Oswald, and Martijn Stam, which examines the challenges and potential solutions in cryptographic systems. Learn about behavior assumptions, standard security notions, and restrictions in authenticated encryption. Discover the three types of goals in this field and understand the concepts of fictions, loops, and internal variables. Gain insights into SVTPRF, leakage, PRF Split, and backside leakage as the presenters discuss their findings and implications for cryptographic security.

Authenticated Encryption in the Face of Protocol and Side Channel Leakage

TheIACR
Add to list