ENEE759O/CMSC858T Cryptography Against Physical Attacks:
Fall 2013 Tentative Presentation Schedule
-
9/24:
- Stefan Dziembowski, Krzysztof Pietrzak: Leakage-Resilient Cryptography. FOCS 2008: 293-302
Dana Dachman-Soled
- Krzysztof Pietrzak: A Leakage-Resilient Mode of Operation. EUROCRYPT 2009: 462-482
Dana Dachman-Soled
-
10/1:
- Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan: Simultaneous Hardcore Bits and Cryptography against Memory Attacks. TCC 2009: 474-495 Pratik Mathur
- Moni Naor, Gil Segev: Public-Key Cryptosystems Resilient to Key Leakage. CRYPTO 2009: 18-35
Dana Dachman-Soled
-
10/8:
- Shai Halevi, Huijia Lin: After-the-Fact Leakage in Public-Key Encryption. TCC 2011: 107-124
Aishwarya Thiruvengadam
- Carmit Hazay, Adriana Lopez-Alt, Hoeteck Wee, Daniel Wichs: Leakage-Resilient Cryptography from Minimal Assumptions. EUROCRYPT 2013: 160-176
Chongxi Bao
-
10/15:
- Jonathan Katz, Vinod Vaikuntanathan: Signature Schemes with Bounded Leakage Resilience. ASIACRYPT 2009: 703-720
Shalabh Jain
- Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy N. Rothblum: Leakage-Resilient Signatures. TCC 2010: 343-360
Dana Dachman-Soled
-
10/22:
- Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt, Daniel Wichs: Cryptography against Continuous Memory Attacks. FOCS 2010: 511-520
Kishan Sudusinghe
- Zvika Brakerski, Yael Tauman Kalai, Jonathan Katz, Vinod Vaikuntanathan: Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage. FOCS 2010: 501-510
Jeff Casarona
Notes for Jeff's presentation.
-
10/29:
- Allison B. Lewko, Mark Lewko, Brent Waters: How to leak on key updates. STOC 2011: 725-734
Dana Dachman-Soled
- Elette Boyle, Gil Segev, Daniel Wichs: Fully Leakage-Resilient Signatures. EUROCRYPT 2011: 89-108
Chongxi Bao
-
11/5:
- Yael Tauman Kalai, Bhavana Kanukurthi, Amit Sahai: Cryptography with Tamperable and Leaky Memory. CRYPTO 2011: 373-390 Pratik Mathur
- Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin: Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. TCC 2004: 258-277
Carson Dunbar
-
11/12:
- Ali Juma, Yevgeniy Vahlis: Protecting Cryptographic Keys against Continual Leakage. CRYPTO 2010: 41-58
Kishan Sudusinghe
- Shafi Goldwasser, Guy N. Rothblum: How to Compute in the Presence of Leakage. FOCS 2012: 31-40
Jeff Casarona
-
11/19:
- Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wichs: Non-Malleable Codes. ICS 2010: 434-452
Carson Dunbar
- Feng-Hao Liu, Anna Lysyanskaya: Tamper and Leakage Resilience in the Split-State Model. CRYPTO 2012: 517-532
Feng-Hao Liu
-
11/26:
- Allison Lewko, Yannis Rouselakis, Brent Waters: Achieving Leakage Resilience Through Dual System Encryption.
CRYPTO (2) 2013: 239-257 Aishwarya Thiruvengadam
- Dana Dachman-Soled, Yael Tauman Kalai: Securing Circuits against Constant-Rate Tampering. CRYPTO 2012: 533-551 Dana Dachman-Soled