Tamper resilient circuits: the adversary at the gates
From MaRDI portal
Publication:2867151
Recommendations
- Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
- Securing circuits and protocols against \(1/\mathrm{poly}(k)\) tampering rate
- Securing circuits against constant-rate tampering
- Private Circuits II: Keeping Secrets in Tamperable Circuits
- On the impossibility of cryptography with tamperable randomness
Cited in
(14)- Continuously non-malleable codes in the split-state model
- Locally decodable and updatable non-malleable codes and their applications
- Subversion-resilient signatures: definitions, constructions and applications
- Securing circuits against constant-rate tampering
- Sequential Circuit Design for Embedded Cryptographic Applications Resilient to Adversarial Faults
- Efficiently testable circuits without conductivity
- scientific article; zbMATH DE number 1149908 (Why is no real title available?)
- Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
- Private Circuits II: Keeping Secrets in Tamperable Circuits
- Securing circuits and protocols against \(1/\mathrm{poly}(k)\) tampering rate
- Steel: composable hardware-based stateful and randomised functional encryption
- (Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates
- Bounded tamper resilience: how to go beyond the algebraic barrier
- Non-malleable Codes with Split-State Refresh
This page was built for publication: Tamper resilient circuits: the adversary at the gates
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2867151)