Leakage-Resilient Storage Scheme for Cryptographic Applications

No Thumbnail Available
File version
Author(s)
Alawatugoda, Janaka
Ragel, Roshan
Eranga, Danushka
Jayanath, Nalaka
Somathilaka, Chinthaka
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Date
2016
Size
File type(s)
Location

Galle, Sri Lanka

License
Abstract

Since the side-channel attacks arise as a huge threat for cryptographic schemes than previously realized, it is necessary to implement proven-secure leakage-resilient cryptographic schemes and use them for real-world purposes. In this work our effort is to implement two leakage-resilient cryptographic schemes, a leakage-resilient storage scheme and a refreshing protocol, which have been proven-secure and accepted by the cryptographic community since 2011 (ASIACRYPT 2011). Our aim is to open up the direction for implementing the useful leakage-resilient cryptographic schemes for future usage.

Journal Title
Conference Title

2016 IEEE International Conference on Information and Automation for Sustainability (ICIAfS)

Book Title
Edition
Volume
Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement
Item Access Status
Note
Access the data
Related item(s)
Subject

Data security and protection

Automation & Control Systems

Computer Science

Computer Science, Information Systems

cryptography

leakage resilience

Persistent link to this record
Citation

Alawatugoda, J; Ragel, R; Eranga, D; Jayanath, N; Somathilaka, C, Leakage-Resilient Storage Scheme for Cryptographic Applications, 2016 IEEE International Conference on Information and Automation for Sustainability (ICIAfS), 2016