Leakage-Resilient Storage Scheme for Cryptographic Applications
File version
Author(s)
Ragel, Roshan
Eranga, Danushka
Jayanath, Nalaka
Somathilaka, Chinthaka
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Date
Size
File type(s)
Location
Galle, Sri Lanka
License
Abstract
Since the side-channel attacks arise as a huge threat for cryptographic schemes than previously realized, it is necessary to implement proven-secure leakage-resilient cryptographic schemes and use them for real-world purposes. In this work our effort is to implement two leakage-resilient cryptographic schemes, a leakage-resilient storage scheme and a refreshing protocol, which have been proven-secure and accepted by the cryptographic community since 2011 (ASIACRYPT 2011). Our aim is to open up the direction for implementing the useful leakage-resilient cryptographic schemes for future usage.
Journal Title
Conference Title
2016 IEEE International Conference on Information and Automation for Sustainability (ICIAfS)
Book Title
Edition
Volume
Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement
Item Access Status
Note
Access the data
Related item(s)
Subject
Data security and protection
Automation & Control Systems
Computer Science
Computer Science, Information Systems
cryptography
leakage resilience
Persistent link to this record
Citation
Alawatugoda, J; Ragel, R; Eranga, D; Jayanath, N; Somathilaka, C, Leakage-Resilient Storage Scheme for Cryptographic Applications, 2016 IEEE International Conference on Information and Automation for Sustainability (ICIAfS), 2016