Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens (Q2947531): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Lower Bounds in the Hardware Token Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Program Obfuscation with Leaky Hardware / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341756 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Physically Uncloneable Functions in the Universal Composition Framework / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Constructions for UC Secure Computation Using Tamper-Proof Hardware / rank
 
Normal rank
Property / cites work
 
Property / cites work: (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4934736 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Feasibility and Infeasibility of Secure Computation with Malicious PUFs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Universally Composable Multiparty Computation with Partially Isolated Parties / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unconditionally Secure and Universally Composable Commitments from Physical Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token / rank
 
Normal rank
Property / cites work
 
Property / cites work: Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: One-Time Programs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Founding Cryptography on Tamper-Proof Hardware Tokens / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Universally Composable Multi-party Computation Using Tamper-Proof Hardware / rank
 
Normal rank
Property / cites work
 
Property / cites work: Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens / rank
 
Normal rank
Property / cites work
 
Property / cites work: David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware / rank
 
Normal rank
Property / cites work
 
Property / cites work: Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Framework for Efficient and Composable Oblivious Transfer / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Computation Using Leaky Tokens / rank
 
Normal rank

Latest revision as of 19:13, 10 July 2024

scientific article
Language Label Description Also known as
English
Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens
scientific article

    Statements

    Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens (English)
    0 references
    0 references
    0 references
    0 references
    24 September 2015
    0 references
    hardware tokens
    0 references
    isolation assumption
    0 references
    UC security
    0 references
    one-time memory
    0 references
    oblivious transfer
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers