메뉴 건너뛰기




Volumn , Issue , 2011, Pages 715-724

Secure computation with information leaking to an adversary

Author keywords

boolean circuit; ram; sidechannel attack

Indexed keywords

COMPUTATION THEORY; EQUIVALENT CIRCUITS; LOGIC CIRCUITS; PROBABILITY; RANDOM ACCESS STORAGE; SEMICONDUCTOR STORAGE; SIDE CHANNEL ATTACK;

EID: 79959763972     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1993636.1993731     Document Type: Conference Paper
Times cited : (28)

References (13)
  • 5
    • 77954640094 scopus 로고    scopus 로고
    • Protecting circuits from leakage: The computationally-bounded and noisy cases
    • H. Gilbert, editor, Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010. Proceedings, Springer
    • S. Faust, T. Rabin, L. Reyzin, E. Tromer, and V. Vaikuntanathan. Protecting circuits from leakage: the computationally-bounded and noisy cases. In H. Gilbert, editor, Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010. Proceedings, volume 6110 of Lecture Notes in Computer Science, pages 135-156. Springer, 2010.
    • (2010) Lecture Notes in Computer Science , vol.6110 , pp. 135-156
    • Faust, S.1    Rabin, T.2    Reyzin, L.3    Tromer, E.4    Vaikuntanathan, V.5
  • 7
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious RAMs. J. ACM, 43(3):431-473, 1996.
    • (1996) J. ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 8
    • 77957009399 scopus 로고    scopus 로고
    • Securing computation against continuous leakage
    • T. Rabin, editor, Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings, Springer
    • S. Goldwasser and G. N. Rothblum. Securing computation against continuous leakage. In T. Rabin, editor, Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings, volume 6223 of Lecture Notes in Computer Science, pages 59-79. Springer, 2010.
    • (2010) Lecture Notes in Computer Science , vol.6223 , pp. 59-79
    • Goldwasser, S.1    Rothblum, G.N.2
  • 9
    • 35248830337 scopus 로고    scopus 로고
    • Private circuits: Securing hardware against probing attacks
    • D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, Springer
    • Y. Ishai, A. Sahai, and D. Wagner. Private circuits: Securing hardware against probing attacks. In D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, volume 2729 of Lecture Notes in Computer Science, pages 463-481. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 463-481
    • Ishai, Y.1    Sahai, A.2    Wagner, D.3
  • 10
    • 35048852134 scopus 로고    scopus 로고
    • Physically observable cryptography
    • extended abstract In M. Naor, editor, Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings, Springer
    • S. Micali and L. Reyzin. Physically observable cryptography (extended abstract). In M. Naor, editor, Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings, volume 2951 of Lecture Notes in Computer Science, pages 278-296. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2951 , pp. 278-296
    • Micali, S.1    Reyzin, L.2
  • 13
    • 0018456413 scopus 로고
    • Relations among complexity measures
    • N. Pippenger and M. J. Fischer. Relations among complexity measures. J. ACM, 26(2):361-381, 1979.
    • (1979) J. ACM , vol.26 , Issue.2 , pp. 361-381
    • Pippenger, N.1    Fischer, M.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.