Private Circuits II: Keeping Secrets in Tamperable Circuits
From MaRDI portal
Publication:3593103
DOI10.1007/11761679_19zbMath1140.94347OpenAlexW1663689473MaRDI QIDQ3593103
David Wagner, Amit Sahai, Yuval Ishai, Manoj Prabhakaran
Publication date: 24 September 2007
Published in: Advances in Cryptology - EUROCRYPT 2006 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11761679_19
Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).
Related Items (25)
The Chaining Lemma and Its Application ⋮ Leakage Resilience of the Blom’s Key Distribution Scheme ⋮ On the impossibility of cryptography with tamperable randomness ⋮ Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience ⋮ Strong continuous non-malleable encoding schemes with tamper-detection ⋮ Combined fault and leakage resilience: composability, constructions and compiler ⋮ Continuously non-malleable codes in the split-state model ⋮ Secure hardware implementation of nonlinear functions in the presence of glitches ⋮ Non-Malleable Codes from Additive Combinatorics ⋮ Compositional Synthesis of Leakage Resilient Programs ⋮ Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience ⋮ Subversion-resilient signatures: definitions, constructions and applications ⋮ Bounded tamper resilience: how to go beyond the algebraic barrier ⋮ Non-malleable Codes with Split-State Refresh ⋮ Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable Codes ⋮ Codes for Side-Channel Attacks and Protections ⋮ Classical leakage resilience from fault-tolerant quantum computation ⋮ Tight upper and lower bounds for leakage-resilient, locally decodable and updatable non-malleable codes ⋮ One-Time Programs ⋮ A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks ⋮ A Leakage-Resilient Mode of Operation ⋮ Locally decodable and updatable non-malleable codes and their applications ⋮ Security of hedged Fiat-Shamir signatures under fault attacks ⋮ Leakage-resilience of the Shamir secret-sharing scheme against physical-bit leakages ⋮ Founding Cryptography on Tamper-Proof Hardware Tokens
Cites Work
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Foundations of Cryptography
- Towards sound approaches to counteract power-analysis attacks
- How to withstand mobile virus attacks (extended abstract)
- Advances in Cryptology - CRYPTO 2003
- Theory of Cryptography
- Theory of Cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Private Circuits II: Keeping Secrets in Tamperable Circuits