Locally decodable and updatable non-malleable codes and their applications (Q2303459): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: Optimal Computational Split-state Non-malleable Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-malleable Reductions and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-malleable codes from additive combinatorics / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Non-malleable Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4425685 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2707451 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2707428 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364574 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the importance of eliminating errors in cryptographic computations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Locally Updatable and Locally Decodable Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information-Theoretic Local Non-malleable Codes and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Capacity of non-malleable codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-malleable coding against bit-wise and split-state tampering / rank
 
Normal rank
Property / cites work
 
Property / cites work: BiTR: Built-in Tamper Resilience / rank
 
Normal rank
Property / cites work
 
Property / cites work: Private information retrieval / rank
 
Normal rank
Property / cites work
 
Property / cites work: From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Securing Circuits against Constant-Rate Tampering / rank
 
Normal rank
Property / cites work
 
Property / cites work: Securing Circuits and Protocols against 1/poly(k) Tampering Rate / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unifying Leakage Models: From Probing Attacks to Noisy Leakage. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Cryptography from the Inner-Product Extractor / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Circuits without Computational Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-malleable Codes from Two-Source Extractors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-Malleable Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Continuous Non-malleable Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Tamper and Leakage Resilient von Neumann Architecture / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Software protection and simulation on oblivious RAMs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Securing Computation against Continuous Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Private Circuits II: Keeping Secrets in Tamperable Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protecting Cryptographic Keys against Continual Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the efficiency of local decoding procedures for error-correcting codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536198 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tamper Resilient Circuits: The Adversary at the Gates / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tamper and Leakage Resilience in the Split-State Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Leakage-Resilient Mode of Operation / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Compute under $${\mathcal {\varvec{AC}}}^\mathbf{0}$$ Leakage without Secure Hardware / rank
 
Normal rank
Property / cites work
 
Property / cites work: Locally Decodable Codes / rank
 
Normal rank

Revision as of 23:53, 21 July 2024

scientific article
Language Label Description Also known as
English
Locally decodable and updatable non-malleable codes and their applications
scientific article

    Statements

    Locally decodable and updatable non-malleable codes and their applications (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    3 March 2020
    0 references
    The paper provides the reader with two new constructions regarding locally decodable and updatable non-malleable codes, a notion introduced by the authors of the mentioned work. The proposed concept is showed to be very important in terms of security against physical attacks. The paper is structured in four sections. The introduction is a very well documented section with respect to non-malleable codes, physical attacks and the connection between these two notions as well as their applications both in coding theory and cryptography. Also, local decodability and updatability are tackled. The introduction includes a set of definitions which are further used by the authors to present their schemes. The recalled references and concepts represent the main ideas on which the article is based. Moreover, subsequent work is presented at the end of the section. In Section 2, entitled Locally decodable and updatable non-malleable codes, some detailed preliminaries regarding leakage-resilient codes are presented, the proposed notion of locally decodable and updatable non-malleable codes is discussed and the security of some closely related concepts is analyzed. Section 3, Our constructions, presents both a one-time secure construction of locally decodable and updatable non-malleable codes and a version which is resistant to continual attacks. Also, the security proofs are very well detailed and other instantiations are given at the end of the section. In Tamper and leakage-resilient RAM, the 4th section of the article, the authors discuss methods of securing RAM computation against memory tampering and leakage attacks from the point of view of their proposed notion. Moreover, the security of their proposed applications is discussed. Relevant references are given at the end of the paper. The technical concepts and properties introduced throughout the article are described in a clear and formal manner. The results of this work are suitable for specialized graduate students which already have technical background regarding the topic of non-malleable codes and physical attacks and, especially, researchers. We could not identify aspects which are not in accordance with the scope of the paper or other incorrect details. The work misses a section of conclusions and very few unimportant typos have been spotted. In conclusion, we believe that the current article is an impressive work especially for researchers interested in technical aspects and new results regarding non-malleable codes and their applications.
    0 references
    error-correcting codes
    0 references
    non-malleable codes
    0 references
    tamper-resilient cryptography
    0 references
    leakage
    0 references
    leakage-resilience
    0 references
    RAM
    0 references
    physical attacks
    0 references
    security
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers