Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
From MaRDI portal
Publication:3012821
DOI10.1007/978-3-642-22006-7_33zbMath1333.94034OpenAlexW2160586212MaRDI QIDQ3012821
Sebastian Faust, Daniele Venturi, Krzysztof Pietrzak
Publication date: 6 July 2011
Published in: Automata, Languages and Programming (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-22006-7_33
Related Items
The Chaining Lemma and Its Application ⋮ On the impossibility of cryptography with tamperable randomness ⋮ Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience ⋮ Continuously non-malleable codes in the split-state model ⋮ Subversion-resilient signatures: definitions, constructions and applications ⋮ Bounded tamper resilience: how to go beyond the algebraic barrier ⋮ Non-malleable Codes with Split-State Refresh ⋮ Locally decodable and updatable non-malleable codes and their applications ⋮ Security of hedged Fiat-Shamir signatures under fault attacks
Cites Work
- Unnamed Item
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-Resilient Signatures
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- Protecting Cryptographic Keys against Continual Leakage
- Securing Computation against Continuous Leakage
- Private Circuits II: Keeping Secrets in Tamperable Circuits
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Signature Schemes with Bounded Leakage Resilience
- Advances in Cryptology - CRYPTO 2003
- Public-Key Cryptosystems Resilient to Key Leakage
- Computer Aided Verification
- Theory of Cryptography
- On the importance of eliminating errors in cryptographic computations