Memoir—Formal Specs and Correctness Proofs
The Mathematics of Side-Channel Attacks
We will look at a collection of mathematical problems suggested by side-channel attacks against public key cryptosystems, and how the techniques inspired by this work relate to a variety of different applications. First, we discuss…
Symbolic Transducers
Cryptography with Weak, Noisy, Leaky and Tempered Keys
Traditionally, to achieve cryptographic security, we require that users generate long perfectly random keys, store them on a perfectly reliable and secure device, and perfectly shield this device to prevent an attacker from observing or…
Generalized Identity-Based Encryption
My talk will mainly be on new developments in generalized identity-based cryptography. Identity-based cryptography is relatively new technology, less than a decade old, in which a message can be encrypted using any string as a…