Publ和ic Key Cryptographyin theBounded Retrieval Model.pptVIP

  • 2
  • 0
  • 约 15页
  • 2017-01-20 发布于湖北
  • 举报

Publ和ic Key Cryptographyin theBounded Retrieval Model.ppt

* * * * * * Public Key Cryptography in the Bounded Retrieval Model Joint work with Jo?l Alwen, Shabsi Walfish Daniel Wichs Rump talk Speaker: Yevgeniy Dodis (NYU) Leakage Attacks Standard Crypto Assumption: keys stored secretly. Reality: information leaks Timing attacks, Power consumption attacks, Freezing attacks, Hackers, Malware, Viruses… Usual Crypto Response: not our problem. Better Crypto Response: provably secure primitives that allow leakage. Assume leakage arbitrary but incomplete. Modeling Incomplete Leakage Adversary can learn any efficiently computable function f : {0,1}*

文档评论(0)

1亿VIP精品文档

相关文档