Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage

In the past, the security of most public-key encryption or key encapsulation schemes is shown in an ideal model, where private keys, secret keys and random values are assumed to be absolutely secure to adversaries. However, this ideal model is not practical due to side-channel attacks in the sense t...

Full description

Bibliographic Details
Main Authors: Jui-Di Wu, Yuh-Min Tseng, Sen-Shan Huang, Tung-Tso Tsai
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Open Journal of the Computer Society
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9140353/