Survey on cyberspace security

H Zhang, W Han, X Lai, D Lin, J Ma, JH Li - Science China Information …, 2015 - Springer
Along with the rapid development and wide application of information technology, human
society has entered the information era. In this era, people live and work in cyberspace …

Biometric cryptosystems: a comprehensive survey

P Kaur, N Kumar, M Singh - Multimedia Tools and Applications, 2023 - Springer
Biometric Cryptosystem (BCS) combines characteristics of both the fields: biometric and
cryptosystem, where biometric provides authentication and cryptosystem imparts security …

Local Shannon entropy measure with statistical tests for image randomness

Y Wu, Y Zhou, G Saveriades, S Agaian, JP Noonan… - Information …, 2013 - Elsevier
In this paper we propose a new image randomness measure using Shannon entropy over
local image blocks. The proposed local Shannon entropy measure overcomes several …

Provably secure higher-order masking of AES

M Rivain, E Prouff - … on Cryptographic Hardware and Embedded Systems, 2010 - Springer
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis
(SCA). To counteract it, masking schemes are usually involved which randomize key …

A unified framework for the analysis of side-channel key recovery attacks

FX Standaert, TG Malkin, M Yung - … on the Theory and Applications of …, 2009 - Springer
The fair evaluation and comparison of side-channel attacks and countermeasures has been
a long standing open question, limiting further developments in the field. Motivated by this …

Simultaneous hardcore bits and cryptography against memory attacks

A Akavia, S Goldwasser, V Vaikuntanathan - Theory of cryptography …, 2009 - Springer
This paper considers two questions in cryptography. Cryptography Secure Against Memory
Attacks. A particularly devastating side-channel attack against cryptosystems, termed the …

Leakage-resilient cryptography

S Dziembowski, K Pietrzak - 2008 49th Annual IEEE …, 2008 - ieeexplore.ieee.org
We construct a stream-cipher S whose implementation is secure even if a bounded amount
of arbitrary (adversarially chosen) information on the internal state ofS is leaked during …

Public key encryption with keyword search secure against keyword guessing attacks without random oracle

L Fang, W Susilo, C Ge, J Wang - Information sciences, 2013 - Elsevier
The notion of public key encryption with keyword search (PEKS) was put forth by Boneh et
al. to enable a server to search from a collection of encrypted emails given a “trapdoor”(ie …

Public-key cryptosystems resilient to key leakage

M Naor, G Segev - Advances in Cryptology-CRYPTO 2009: 29th Annual …, 2009 - Springer
Most of the work in the analysis of cryptographic schemes is concentrated in abstract
adversarial models that do not capture side-channel attacks. Such attacks exploit various …

Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage

Z Brakerski, YT Kalai, J Katz… - 2010 IEEE 51st …, 2010 - ieeexplore.ieee.org
In recent years, there has been a major effort to design cryptographic schemes that remain
secure even when arbitrary information about the secret key is leaked (eg, via side-channel …