Leakage-resilient authentication.
dc.rights.license | CC-BY-NC-ND | |
dc.contributor.advisor | Kiltz, Eike | |
dc.contributor.advisor | Pietrzak, Krzysztof | |
dc.contributor.author | Schipper, J.H. | |
dc.date.accessioned | 2011-03-29T17:00:51Z | |
dc.date.available | 2011-03-29 | |
dc.date.available | 2011-03-29T17:00:51Z | |
dc.date.issued | 2011 | |
dc.identifier.uri | https://studenttheses.uu.nl/handle/20.500.12932/6824 | |
dc.description.abstract | Leakage-resilient cryptography tries to design algorithms that are provably secure against side-channel attacks, attacks that exploit the physical instead of algorithmic properties of an implementation. We present a message authentication code that is secure in the model proposed by Micali and Reyzin [MR04]; it is essentially a combination of a leakage-resilient pseudorandom generator as found by (Dziembowski and) Pietrzak [Pie09a, DP08] and an ordinary (one-time) MAC. We also give some supplementary results about these generators. | |
dc.description.sponsorship | Utrecht University | |
dc.format.extent | 571204 bytes | |
dc.format.mimetype | application/pdf | |
dc.language.iso | en | |
dc.title | Leakage-resilient authentication. | |
dc.type.content | Master Thesis | |
dc.rights.accessrights | Open Access | |
dc.subject.courseuu | Mathematical Sciences |