Private Circuits II: Keeping Secrets in Tamperable Circuits

From MaRDI portal
Publication:3593103

DOI10.1007/11761679_19zbMath1140.94347OpenAlexW1663689473MaRDI QIDQ3593103

David Wagner, Amit Sahai, Yuval Ishai, Manoj Prabhakaran

Publication date: 24 September 2007

Published in: Advances in Cryptology - EUROCRYPT 2006 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11761679_19



Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).


Related Items (25)

The Chaining Lemma and Its ApplicationLeakage Resilience of the Blom’s Key Distribution SchemeOn the impossibility of cryptography with tamperable randomnessEfficient Public-Key Cryptography with Bounded Leakage and Tamper ResilienceStrong continuous non-malleable encoding schemes with tamper-detectionCombined fault and leakage resilience: composability, constructions and compilerContinuously non-malleable codes in the split-state modelSecure hardware implementation of nonlinear functions in the presence of glitchesNon-Malleable Codes from Additive CombinatoricsCompositional Synthesis of Leakage Resilient ProgramsTamper-Proof Circuits: How to Trade Leakage for Tamper-ResilienceSubversion-resilient signatures: definitions, constructions and applicationsBounded tamper resilience: how to go beyond the algebraic barrierNon-malleable Codes with Split-State RefreshTight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable CodesCodes for Side-Channel Attacks and ProtectionsClassical leakage resilience from fault-tolerant quantum computationTight upper and lower bounds for leakage-resilient, locally decodable and updatable non-malleable codesOne-Time ProgramsA Unified Framework for the Analysis of Side-Channel Key Recovery AttacksA Leakage-Resilient Mode of OperationLocally decodable and updatable non-malleable codes and their applicationsSecurity of hedged Fiat-Shamir signatures under fault attacksLeakage-resilience of the Shamir secret-sharing scheme against physical-bit leakagesFounding Cryptography on Tamper-Proof Hardware Tokens



Cites Work


This page was built for publication: Private Circuits II: Keeping Secrets in Tamperable Circuits