메뉴 건너뛰기




Volumn 6597 LNCS, Issue , 2011, Pages 125-143

One-time computable self-erasing functions

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER VIRUSES; HASH FUNCTIONS;

EID: 79953231613     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19571-6_9     Document Type: Conference Paper
Times cited : (48)

References (38)
  • 1
    • 70350627587 scopus 로고    scopus 로고
    • Simultaneous hardcore bits and cryptography against memory attacks
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474-495. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 474-495
    • Akavia, A.1    Goldwasser, S.2    Vaikuntanathan, V.3
  • 2
    • 77954650592 scopus 로고    scopus 로고
    • Public-key encryption in the bounded-retrieval model
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Alwen, J., Dodis, Y., Naor, M., Segev, G., Walfish, S., Wichs, D.: Public-key encryption in the bounded-retrieval model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 113-134. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 113-134
    • Alwen, J.1    Dodis, Y.2    Naor, M.3    Segev, G.4    Walfish, S.5    Wichs, D.6
  • 3
    • 70350340328 scopus 로고    scopus 로고
    • Leakage-resilient public-key cryptography in the bounded-retrieval model
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Alwen, J., Dodis, Y., Wichs, D.: Leakage-resilient public-key cryptography in the bounded-retrieval model. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 36-54. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 36-54
    • Alwen, J.1    Dodis, Y.2    Wichs, D.3
  • 7
    • 77957010426 scopus 로고    scopus 로고
    • Circular and leakage resilient public-key encryption under subgroup indistinguishability
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Brakerski, Z., Goldwasser, S.: Circular and leakage resilient public-key encryption under subgroup indistinguishability. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 1-20. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 1-20
    • Brakerski, Z.1    Goldwasser, S.2
  • 9
    • 33749565828 scopus 로고    scopus 로고
    • Mitigating dictionary attacks on password-protected local storage
    • Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
    • Canetti, R., Halevi, S., Steiner, M.: Mitigating dictionary attacks on password-protected local storage. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 160-179. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 160-179
    • Canetti, R.1    Halevi, S.2    Steiner, M.3
  • 10
    • 38049016824 scopus 로고    scopus 로고
    • Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Cash, D.M., Ding, Y.Z., Dodis, Y., Lee, W., Lipton, R.J., Walfish, S.: Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 479-498. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 479-498
    • Cash, D.M.1    Ding, Y.Z.2    Dodis, Y.3    Lee, W.4    Lipton, R.J.5    Walfish, S.6
  • 11
    • 33745629609 scopus 로고    scopus 로고
    • Perfectly secure password protocols in the bounded retrieval model
    • Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
    • Di Crescenzo, G., Lipton, R.J., Walfish, S.: Perfectly secure password protocols in the bounded retrieval model. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 225-244. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3876 , pp. 225-244
    • Di Crescenzo, G.1    Lipton, R.J.2    Walfish, S.3
  • 12
    • 77958056591 scopus 로고    scopus 로고
    • Leakage-resilient storage
    • Garay, J.A., De Prisco, R. (eds.) SCN 2010. Springer, Heidelberg
    • Davì, F., Dziembowski, S., Venturi, D.: Leakage-resilient storage. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 121-137. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6280 , pp. 121-137
    • Davì, F.1    Dziembowski, S.2    Venturi, D.3
  • 13
    • 77949580684 scopus 로고    scopus 로고
    • Public-key encryption schemes with auxiliary inputs
    • Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
    • Dodis, Y., Goldwasser, S., Tauman Kalai, Y., Peikert, C., Vaikuntanathan, V.: Public-key encryption schemes with auxiliary inputs. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 361-381. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 361-381
    • Dodis, Y.1    Goldwasser, S.2    Tauman Kalai, Y.3    Peikert, C.4    Vaikuntanathan, V.5
  • 15
    • 35248835679 scopus 로고    scopus 로고
    • On memory-bound functions for fighting spam
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Dwork, C., Goldberg, A., Naor, M.: On memory-bound functions for fighting spam. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 426-444. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 426-444
    • Dwork, C.1    Goldberg, A.2    Naor, M.3
  • 16
    • 33745136796 scopus 로고    scopus 로고
    • Pebbling and proofs of work
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Dwork, C., Naor, M., Wee, H.: Pebbling and proofs of work. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 37-54. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 37-54
    • Dwork, C.1    Naor, M.2    Wee, H.3
  • 17
    • 33745532541 scopus 로고    scopus 로고
    • Intrusion-resilience via the bounded-storage model
    • Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
    • Dziembowski, S.: Intrusion-resilience via the bounded-storage model. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 207-224. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3876 , pp. 207-224
    • Dziembowski, S.1
  • 18
    • 33749583877 scopus 로고    scopus 로고
    • On forward-secure storage
    • Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
    • Dziembowski, S.: On forward-secure storage. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 251-270. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 251-270
    • Dziembowski, S.1
  • 19
    • 79953207453 scopus 로고    scopus 로고
    • One-Time Computable Self-Erasing Functions
    • ePrint Archive
    • Dziembowski, S., Kazana, T., Wichs, D.: One-Time Computable Self-Erasing Functions (2010), Cryptology ePrint Archive
    • (2010) Cryptology
    • Dziembowski, S.1    Kazana, T.2    Wichs, D.3
  • 20
    • 4344699394 scopus 로고    scopus 로고
    • Optimal randomizer efficiency in the bounded-storage model
    • Dziembowski, S., Maurer, U.M.: Optimal randomizer efficiency in the bounded-storage model. J. Cryptology 17(1) (2004)
    • (2004) J. Cryptology , vol.17 , Issue.1
    • Dziembowski, S.1    Maurer, U.M.2
  • 21
    • 46749096773 scopus 로고    scopus 로고
    • Intrusion-resilient secret sharing
    • Dziembowski, S., Pietrzak, K.: Intrusion-resilient secret sharing. In: FOCS (2007)
    • (2007) FOCS
    • Dziembowski, S.1    Pietrzak, K.2
  • 22
    • 57949107348 scopus 로고    scopus 로고
    • Leakage-resilient cryptography
    • Dziembowski, S., Pietrzak, K.: Leakage-resilient cryptography. In: FOCS (2008)
    • (2008) FOCS
    • Dziembowski, S.1    Pietrzak, K.2
  • 25
    • 77949631657 scopus 로고    scopus 로고
    • Leakage-resilient signatures
    • Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
    • Faust, S., Kiltz, E., Pietrzak, K., Rothblum, G.N.: Leakage-resilient signatures. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 343-360. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 343-360
    • Faust, S.1    Kiltz, E.2    Pietrzak, K.3    Rothblum, G.N.4
  • 26
    • 35048896529 scopus 로고    scopus 로고
    • Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
    • Naor, M. (ed.) TCC 2004. Springer, Heidelberg
    • Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., Rabin, T.: Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 258-277. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2951 , pp. 258-277
    • Gennaro, R.1    Lysyanskaya, A.2    Malkin, T.3    Micali, S.4    Rabin, T.5
  • 27
    • 33746066725 scopus 로고    scopus 로고
    • Private Circuits II: Keeping Secrets in Tamperable Circuits
    • Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
    • Ishai, Y., Prabhakaran, M., Sahai, A., Wagner, D.: Private Circuits II: Keeping Secrets in Tamperable Circuits. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 308-327. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 308-327
    • Ishai, Y.1    Prabhakaran, M.2    Sahai, A.3    Wagner, D.4
  • 28
    • 35248830337 scopus 로고    scopus 로고
    • Private Circuits: Securing Hardware against Probing Attacks
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Ishai, Y., Sahai, A., Wagner, D.: Private Circuits: Securing Hardware against Probing Attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463-481. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 463-481
    • Ishai, Y.1    Sahai, A.2    Wagner, D.3
  • 29
    • 72449205531 scopus 로고    scopus 로고
    • Signature schemes with bounded leakage resilience
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Katz, J., Vaikuntanathan, V.: Signature schemes with bounded leakage resilience. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 703-720. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 703-720
    • Katz, J.1    Vaikuntanathan, V.2
  • 30
    • 77958074345 scopus 로고    scopus 로고
    • Algorithmic tamper-proof security under probing attacks
    • Garay, J.A., De Prisco, R. (eds.) SCN 2010. Springer, Heidelberg
    • Liu, F.-H., Lysyanskaya, A.: Algorithmic tamper-proof security under probing attacks. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 106-120. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6280 , pp. 106-120
    • Liu, F.-H.1    Lysyanskaya, A.2
  • 31
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • Maurer, U.M.: Conditionally-perfect secrecy and a provably-secure randomized cipher. J. Cryptology 5(1) (1992)
    • (1992) J. Cryptology , vol.5 , Issue.1
    • Maurer, U.M.1
  • 32
    • 35048852134 scopus 로고    scopus 로고
    • Physically observable cryptography
    • Naor, M. (ed.) TCC 2004. Springer, Heidelberg
    • Micali, S., Reyzin, L.: Physically observable cryptography. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 278-296. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2951 , pp. 278-296
    • Micali, S.1    Reyzin, L.2
  • 33
    • 70350303869 scopus 로고    scopus 로고
    • Public-key cryptosystems resilient to key leakage
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 18-35. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 18-35
    • Naor, M.1    Segev, G.2
  • 34
    • 78049363496 scopus 로고    scopus 로고
    • Secure code update for embedded devices via proofs of secure erasure
    • Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. Springer, Heidelberg
    • Perito, D., Tsudik, G.: Secure code update for embedded devices via proofs of secure erasure. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 643-662. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6345 , pp. 643-662
    • Perito, D.1    Tsudik, G.2
  • 35
    • 67650675583 scopus 로고    scopus 로고
    • A leakage-resilient mode of operation
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Pietrzak, K.: A leakage-resilient mode of operation. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 462-482. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 462-482
    • Pietrzak, K.1
  • 37
    • 67650694228 scopus 로고    scopus 로고
    • A unified framework for the analysis of side-channel key recovery attacks
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Standaert, F.-X., Malkin, T., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443-461. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 443-461
    • Standaert, F.-X.1    Malkin, T.2    Yung, M.3
  • 38
    • 35248831179 scopus 로고    scopus 로고
    • Captcha: Using hard ai problems for security
    • Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
    • von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: Captcha: Using hard ai problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656
    • Von Ahn, L.1    Blum, M.2    Hopper, N.J.3    Langford, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.