{"citation":{"ieee":"K. Z. Pietrzak, “A leakage resilient mode of operation,” presented at the CRYPTO: International Cryptology Conference, 2009, vol. 5479, pp. 462–482.","mla":"Pietrzak, Krzysztof Z. A Leakage Resilient Mode of Operation. Vol. 5479, Springer, 2009, pp. 462–82, doi:10.1007/978-3-642-01001-9_27.","chicago":"Pietrzak, Krzysztof Z. “A Leakage Resilient Mode of Operation,” 5479:462–82. Springer, 2009. https://doi.org/10.1007/978-3-642-01001-9_27.","ama":"Pietrzak KZ. A leakage resilient mode of operation. In: Vol 5479. Springer; 2009:462-482. doi:10.1007/978-3-642-01001-9_27","ista":"Pietrzak KZ. 2009. A leakage resilient mode of operation. CRYPTO: International Cryptology Conference, LNCS, vol. 5479, 462–482.","apa":"Pietrzak, K. Z. (2009). A leakage resilient mode of operation (Vol. 5479, pp. 462–482). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/10.1007/978-3-642-01001-9_27","short":"K.Z. Pietrzak, in:, Springer, 2009, pp. 462–482."},"type":"conference","title":"A leakage resilient mode of operation","month":"05","_id":"3232","doi":"10.1007/978-3-642-01001-9_27","conference":{"name":"CRYPTO: International Cryptology Conference"},"publication_status":"published","volume":5479,"publisher":"Springer","page":"462 - 482","extern":1,"author":[{"full_name":"Krzysztof Pietrzak","orcid":"0000-0002-9139-1654","first_name":"Krzysztof Z","last_name":"Pietrzak","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87"}],"publist_id":"3448","quality_controlled":0,"date_published":"2009-05-28T00:00:00Z","year":"2009","day":"28","date_created":"2018-12-11T12:02:09Z","abstract":[{"text":"A weak pseudorandom function (wPRF) is a cryptographic primitive similar to - but weaker than - a pseudorandom function: for wPRFs one only requires that the output is pseudorandom when queried on random inputs.We show that unlike "normal" PRFs, wPRFs are seedincompressible, in the sense that the output of a wPRF is pseudorandom even if a bounded amount of information about the key is leaked. As an application of this result we construct a simple mode of operation which - when instantiated with any wPRF - gives a leakage-resilient stream-cipher. The implementation of such a cipher is secure against every side-channel attack, as long as the amount of information leaked per round is bounded, but overall can be arbitrary large. The construction is simpler than the previous one (Dziembowski-Pietrzak FOCS'08) as it only uses a single primitive (a wPRF) in a straight forward manner. ","lang":"eng"}],"status":"public","alternative_title":["LNCS"],"intvolume":" 5479","date_updated":"2021-01-12T07:41:59Z"}