How to Compute under $${\mathcal {\varvec{AC}}}^\mathbf{0}$$ Leakage without Secure Hardware
From MaRDI portal
Publication:2914283
DOI10.1007/978-3-642-32009-5_32zbMath1296.94138OpenAlexW128586694MaRDI QIDQ2914283
Publication date: 25 September 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-32009-5_32
Related Items (14)
Adaptive extractors and their application to leakage resilient secret sharing ⋮ How to Compute in the Presence of Leakage ⋮ On the impossibility of cryptography with tamperable randomness ⋮ Short leakage resilient and non-malleable secret sharing schemes ⋮ New bounds on the local leakage resilience of Shamir's secret sharing scheme ⋮ Unifying leakage models: from probing attacks to noisy leakage ⋮ Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification ⋮ Efficient Leakage Resilient Circuit Compilers ⋮ Unnamed Item ⋮ On the local leakage resilience of linear secret sharing schemes ⋮ Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits ⋮ Unconditionally secure computation against low-complexity leakage ⋮ Correction to: ``Unconditionally secure computation against low-complexity leakage ⋮ Locally decodable and updatable non-malleable codes and their applications
This page was built for publication: How to Compute under $${\mathcal {\varvec{AC}}}^\mathbf{0}$$ Leakage without Secure Hardware