메뉴 건너뛰기




Volumn , Issue , 2010, Pages 511-520

Cryptography against continuous memory attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; COMPUTERS;

EID: 78751485079     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FOCS.2010.56     Document Type: Conference Paper
Times cited : (204)

References (35)
  • 1
    • 70350627587 scopus 로고    scopus 로고
    • Simultaneous hardcore bits and cryptography against memory attacks
    • TCC, ser. O. Reingold, Ed., Springer
    • A. Akavia, S. Goldwasser, and V. Vaikuntanathan, "Simultaneous hardcore bits and cryptography against memory attacks," in TCC, ser. Lecture Notes in Computer Science, O. Reingold, Ed., vol. 5444. Springer, 2009, pp. 474-495.
    • (2009) Lecture Notes in Computer Science , vol.5444 , pp. 474-495
    • Akavia, A.1    Goldwasser, S.2    Vaikuntanathan, V.3
  • 2
    • 77954650592 scopus 로고    scopus 로고
    • Public-key encryption in the bounded-retrieval model
    • EUROCRYPT, ser. H. Gilbert, Ed., Springer
    • J. Alwen, Y. Dodis, M. Naor, G. Segev, S. Walfish, and D. Wichs, "Public-key encryption in the bounded-retrieval model," in EUROCRYPT, ser. Lecture Notes in Computer Science, H. Gilbert, Ed., vol. 6110. Springer, 2010, pp. 113-134.
    • (2010) Lecture Notes in Computer Science , vol.6110 , pp. 113-134
    • Alwen, J.1    Dodis, Y.2    Naor, M.3    Segev, G.4    Walfish, S.5    Wichs, D.6
  • 3
    • 70350340328 scopus 로고    scopus 로고
    • Leakage-resilient public-key cryptography in the bounded-retrieval model
    • CRYPTO, ser. S. Halevi, Ed., Springer
    • J. Alwen, Y. Dodis, and D. Wichs, "Leakage-resilient public-key cryptography in the bounded-retrieval model," in CRYPTO, ser. Lecture Notes in Computer Science, S. Halevi, Ed., vol. 5677. Springer, 2009, pp. 36-54.
    • (2009) Lecture Notes in Computer Science , vol.5677 , pp. 36-54
    • Alwen, J.1    Dodis, Y.2    Wichs, D.3
  • 5
    • 35248851617 scopus 로고    scopus 로고
    • Correlation-resistant storage via keyword-searchable encryption
    • Archive, Report 2005/417
    • L. Ballard, M. Green, B. de Medeiros, and F. Monrose, "Correlation-resistant storage via keyword-searchable encryption," Cryptology ePrint Archive, Report 2005/417, 2005, http://eprint.iacr.org/.
    • (2005) Cryptology
    • Ballard, L.1    Green, M.2    De Medeiros, B.3    Monrose, F.4
  • 7
    • 0003153237 scopus 로고
    • Non-interactive zero-knowledge and its applications
    • extended abstract
    • M. Blum, P. Feldman, and S. Micali, "Non-interactive zero-knowledge and its applications (extended abstract)," in STOC. ACM, 1988, pp. 103-112.
    • (1988) STOC. ACM , pp. 103-112
    • Blum, M.1    Feldman, P.2    Micali, S.3
  • 9
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • CRYPTO, ser. M. K. Franklin, Ed., Springer
    • D. Boneh, X. Boyen, and H. Shacham, "Short group signatures," in CRYPTO, ser. Lecture Notes in Computer Science, M. K. Franklin, Ed., vol. 3152. Springer, 2004, pp. 41-55.
    • (2004) Lecture Notes in Computer Science , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 10
    • 78751478860 scopus 로고    scopus 로고
    • Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage
    • full version
    • Z. Brakerski, Y. T. Kalai, J. Katz, and V. Vaikuntanathan, "Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage," FOCS, 2010, full version: http://eprint.iacr. org/2010/278.
    • (2010) FOCS
    • Brakerski, Z.1    Kalai, Y.T.2    Katz, J.3    Vaikuntanathan, V.4
  • 11
    • 84948973494 scopus 로고    scopus 로고
    • Exposure-resilient functions and all-or-nothing transforms
    • EUROCRYPT, ser. B. Preneel, Ed., Springer
    • R. Canetti, Y. Dodis, S. Halevi, E. Kushilevitz, and A. Sahai, "Exposure-resilient functions and all-or-nothing transforms," in EUROCRYPT, ser. Lecture Notes in Computer Science, B. Preneel, Ed., vol. 1807. Springer, 2000, pp. 453-469.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 453-469
    • Canetti, R.1    Dodis, Y.2    Halevi, S.3    Kushilevitz, E.4    Sahai, A.5
  • 12
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • CRYPTO, ser. H. Krawczyk, Ed., Springer
    • R. Cramer and V. Shoup, "A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack," in CRYPTO, ser. Lecture Notes in Computer Science, H. Krawczyk, Ed., vol. 1462. Springer, 1998, pp. 13-25.
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 13
    • 78751485079 scopus 로고    scopus 로고
    • Cryptography against continuous memory attacks
    • ePrint Archive, Report 2010/196
    • Y. Dodis, K. Haralambiev, A. López-Alt, and D. Wichs, "Cryptography against continuous memory attacks," Cryptology ePrint Archive, Report 2010/196, 2010.
    • (2010) Cryptology
    • Dodis, Y.1    Haralambiev, K.2    López-Alt, A.3    Wichs, D.4
  • 14
    • 78650817944 scopus 로고    scopus 로고
    • Efficient public-key cryptography in the presence of key leakage
    • ePrint Archive, Report 2010/154
    • -, "Efficient public-key cryptography in the presence of key leakage," Cryptology ePrint Archive, Report 2010/154, 2010.
    • (2010) Cryptology
    • Dodis, Y.1    Haralambiev, K.2    López-Alt, A.3    Wichs, D.4
  • 15
    • 85028450627 scopus 로고
    • Non-malleable cryptography
    • D. Dolev, C. Dwork, and M. Naor, "Non-malleable cryptography," in STOC. ACM, 1991, pp. 542-552.
    • (1991) STOC. ACM , pp. 542-552
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 16
    • 57949107348 scopus 로고    scopus 로고
    • Leakage-resilient cryptography
    • IEEE Computer Society
    • S. Dziembowski and K. Pietrzak, "Leakage-resilient cryptography," in FOCS. IEEE Computer Society, 2008, pp. 293-302.
    • (2008) FOCS , pp. 293-302
    • Dziembowski, S.1    Pietrzak, K.2
  • 17
  • 19
    • 67650659194 scopus 로고    scopus 로고
    • Cryptography without (hardly any) secrets?
    • EUROCRYPT, ser. A. Joux, Ed., Springer
    • S. Goldwasser, "Cryptography without (hardly any) secrets ?" in EUROCRYPT, ser. Lecture Notes in Computer Science, A. Joux, Ed., vol. 5479. Springer, 2009, pp. 369-370.
    • (2009) Lecture Notes in Computer Science , vol.5479 , pp. 369-370
    • Goldwasser, S.1
  • 20
    • 78751471777 scopus 로고    scopus 로고
    • How to play mental solitaire under continuous side-channels: A completeness theorem using secure hardware
    • to Appear at
    • S. Goldwasser and G. N. Rothblum, "How to play mental solitaire under continuous side-channels: A completeness theorem using secure hardware," to Appear at CRYPTO 2010.
    • CRYPTO 2010
    • Goldwasser, S.1    Rothblum, G.N.2
  • 21
    • 44449140946 scopus 로고    scopus 로고
    • Efficient non-interactive proof systems for bilinear groups
    • EUROCRYPT, ser. N. P. Smart, Ed., Springer
    • J. Groth and A. Sahai, "Efficient non-interactive proof systems for bilinear groups," in EUROCRYPT, ser. Lecture Notes in Computer Science, N. P. Smart, Ed., vol. 4965. Springer, 2008, pp. 415-432.
    • (2008) Lecture Notes in Computer Science , vol.4965 , pp. 415-432
    • Groth, J.1    Sahai, A.2
  • 22
    • 70350336468 scopus 로고    scopus 로고
    • Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, ser. Springer
    • S. Halevi, Ed., Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, ser. Lecture Notes in Computer Science, vol. 5677. Springer, 2009.
    • Lecture Notes in Computer Science , vol.5677 , pp. 2009
    • Halevi, S.1
  • 23
    • 38049165151 scopus 로고    scopus 로고
    • Secure hybrid encryption from weakened key encapsulation
    • CRYPTO, ser. A. Menezes, Ed., Springer
    • D. Hofheinz and E. Kiltz, "Secure hybrid encryption from weakened key encapsulation," in CRYPTO, ser. Lecture Notes in Computer Science, A. Menezes, Ed., vol. 4622. Springer, 2007, pp. 553-571.
    • (2007) Lecture Notes in Computer Science , vol.4622 , pp. 553-571
    • Hofheinz, D.1    Kiltz, E.2
  • 24
    • 35248830337 scopus 로고    scopus 로고
    • Private circuits: Securing hardware against probing attacks
    • CRYPTO, ser. D. Boneh, Ed., Springer
    • Y. Ishai, A. Sahai, and D. Wagner, "Private circuits: Securing hardware against probing attacks," in CRYPTO, ser. Lecture Notes in Computer Science, D. Boneh, Ed., vol. 2729. Springer, 2003, pp. 463-481.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 463-481
    • Ishai, Y.1    Sahai, A.2    Wagner, D.3
  • 25
    • 78751564095 scopus 로고    scopus 로고
    • Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, ser. Springer
    • A. Joux, Ed., Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, ser. Lecture Notes in Computer Science, vol. 5479. Springer, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5479
    • Joux, A.1
  • 26
    • 78751492311 scopus 로고    scopus 로고
    • Protecting cryptographic keys against continual leakage
    • to appear at
    • A. Juma and Y. Vahlis, "Protecting cryptographic keys against continual leakage," to appear at CRYPTO 2010.
    • CRYPTO 2010
    • Juma, A.1    Vahlis, Y.2
  • 27
    • 72449205531 scopus 로고    scopus 로고
    • Signature schemes with bounded leakage resilience
    • ASIACRYPT, ser. M. Matsui, Ed., Springer
    • J. Katz and V. Vaikuntanathan, "Signature schemes with bounded leakage resilience," in ASIACRYPT, ser. Lecture Notes in Computer Science, M. Matsui, Ed., vol. 5912. Springer, 2009, pp. 703-720.
    • (2009) Lecture Notes in Computer Science , vol.5912 , pp. 703-720
    • Katz, J.1    Vaikuntanathan, V.2
  • 28
    • 35048852134 scopus 로고    scopus 로고
    • Physically observable cryptography
    • TCC, ser. M. Naor, Ed., Springer
    • S. Micali and L. Reyzin, "Physically observable cryptography," in TCC, ser. Lecture Notes in Computer Science, M. Naor, Ed., vol. 2951. Springer, 2004, pp. 278-296.
    • (2004) Lecture Notes in Computer Science , vol.2951 , pp. 278-296
    • Micali, S.1    Reyzin, L.2
  • 29
    • 70350303869 scopus 로고    scopus 로고
    • Public-key cryptosystems resilient to key leakage
    • CRYPTO, ser. S. Halevi, Ed., Springer
    • M. Naor and G. Segev, "Public-key cryptosystems resilient to key leakage," in CRYPTO, ser. Lecture Notes in Computer Science, S. Halevi, Ed., vol. 5677. Springer, 2009, pp. 18-35.
    • (2009) Lecture Notes in Computer Science , vol.5677 , pp. 18-35
    • Naor, M.1    Segev, G.2
  • 30
    • 67650675583 scopus 로고    scopus 로고
    • A leakage-resilient mode of operation
    • EUROCRYPT, ser. A. Joux, Ed., Springer
    • K. Pietrzak, "A leakage-resilient mode of operation," in EUROCRYPT, ser. Lecture Notes in Computer Science, A. Joux, Ed., vol. 5479. Springer, 2009, pp. 462-482.
    • (2009) Lecture Notes in Computer Science , vol.5479 , pp. 462-482
    • Pietrzak, K.1
  • 31
    • 33745125579 scopus 로고
    • Non-interactive zero-knowledge with preprocessing
    • CRYPTO, ser. S. Goldwasser, Ed., Springer
    • A. D. Santis, S. Micali, and G. Persiano, "Non-interactive zero-knowledge with preprocessing," in CRYPTO, ser. Lecture Notes in Computer Science, S. Goldwasser, Ed., vol. 403. Springer, 1988, pp. 269-282.
    • (1988) Lecture Notes in Computer Science , vol.403 , pp. 269-282
    • Santis, A.D.1    Micali, S.2    Persiano, G.3
  • 32
    • 33646718113 scopus 로고    scopus 로고
    • Authenticated id-based key exchange and remote log-in with simple token and pin number
    • ePrint Archive, Report 2002/164
    • M. Scott, "Authenticated id-based key exchange and remote log-in with simple token and pin number," Cryptology ePrint Archive, Report 2002/164, 2002.
    • (2002) Cryptology
    • Scott, M.1
  • 33
    • 38049124394 scopus 로고    scopus 로고
    • A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants
    • ePrint Archive, Report 2007/074
    • H. Shacham, "A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants," Cryptology ePrint Archive, Report 2007/074, 2007.
    • (2007) Cryptology
    • Shacham, H.1
  • 34
    • 23044474013 scopus 로고    scopus 로고
    • Evidence that xtr is more secure than super-singular elliptic curve cryptosystems
    • E. R. Verheul, "Evidence that xtr is more secure than super-singular elliptic curve cryptosystems," J. Cryptology, vol. 17, no. 4, pp. 277-296, 2004.
    • (2004) J. Cryptology , vol.17 , Issue.4 , pp. 277-296
    • Verheul, E.R.1
  • 35
    • 78751490148 scopus 로고    scopus 로고
    • personal Communication. April
    • B. Waters, personal Communication. April 2010.
    • (2010)
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.