Locally decodable and updatable non-malleable codes and their applications
From MaRDI portal
Publication:2303459
DOI10.1007/s00145-018-9306-zzbMath1456.94067OpenAlexW2902618608WikidataQ128860307 ScholiaQ128860307MaRDI QIDQ2303459
Hong-Sheng Zhou, Elaine Shi, Feng-Hao Liu, Dana Dachman-Soled
Publication date: 3 March 2020
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-018-9306-z
securityerror-correcting codesphysical attacksnon-malleable codestamper-resilient cryptographyleakageRAMleakage-resilience
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Non-malleable coding against bit-wise and split-state tampering
- Information-Theoretic Local Non-malleable Codes and Their Applications
- Optimal Computational Split-state Non-malleable Codes
- Non-malleable Codes from Two-Source Extractors
- Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier
- Tamper Resilient Circuits: The Adversary at the Gates
- Leakage-Resilient Circuits without Computational Assumptions
- Tamper and Leakage Resilience in the Split-State Model
- Securing Circuits against Constant-Rate Tampering
- How to Compute under $${\mathcal {\varvec{AC}}}^\mathbf{0}$$ Leakage without Secure Hardware
- A Tamper and Leakage Resilient von Neumann Architecture
- Non-malleable Reductions and Applications
- Capacity of non-malleable codes
- Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
- Leakage-Resilient Cryptography from the Inner-Product Extractor
- BiTR: Built-in Tamper Resilience
- Private information retrieval
- On the efficiency of local decoding procedures for error-correcting codes
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
- Protecting Cryptographic Keys against Continual Leakage
- Securing Computation against Continuous Leakage
- Private Circuits II: Keeping Secrets in Tamperable Circuits
- A Leakage-Resilient Mode of Operation
- Software protection and simulation on oblivious RAMs
- Non-Malleable Codes
- Non-malleable codes from additive combinatorics
- A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations
- Leakage-Resilient Non-malleable Codes
- From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
- Advances in Cryptology - CRYPTO 2003
- Continuous Non-malleable Codes
- Locally Updatable and Locally Decodable Codes
- Securing Circuits and Protocols against 1/poly(k) Tampering Rate
- Locally Decodable Codes
- Theory of Cryptography
- Theory of Cryptography
- On the importance of eliminating errors in cryptographic computations
This page was built for publication: Locally decodable and updatable non-malleable codes and their applications