Show simple item record

dc.rights.licenseCC-BY-NC-ND
dc.contributor.advisorKiltz, Eike
dc.contributor.advisorPietrzak, Krzysztof
dc.contributor.authorSchipper, J.H.
dc.date.accessioned2011-03-29T17:00:51Z
dc.date.available2011-03-29
dc.date.available2011-03-29T17:00:51Z
dc.date.issued2011
dc.identifier.urihttps://studenttheses.uu.nl/handle/20.500.12932/6824
dc.description.abstractLeakage-resilient cryptography tries to design algorithms that are provably secure against side-channel attacks, attacks that exploit the physical instead of algorithmic properties of an implementation. We present a message authentication code that is secure in the model proposed by Micali and Reyzin [MR04]; it is essentially a combination of a leakage-resilient pseudorandom generator as found by (Dziembowski and) Pietrzak [Pie09a, DP08] and an ordinary (one-time) MAC. We also give some supplementary results about these generators.
dc.description.sponsorshipUtrecht University
dc.format.extent571204 bytes
dc.format.mimetypeapplication/pdf
dc.language.isoen
dc.titleLeakage-resilient authentication.
dc.type.contentMaster Thesis
dc.rights.accessrightsOpen Access
dc.subject.courseuuMathematical Sciences


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record