메뉴 건너뛰기




Volumn 6755 LNCS, Issue PART 1, 2011, Pages 391-402

Tamper-proof circuits: How to trade leakage for tamper-resilience

Author keywords

[No Author keywords available]

Indexed keywords

AMOUNT OF INFORMATION; AUXILIARY INFORMATION; BLACK BOXES; COMPLEX COMPUTATION; CRYPTANALYTIC ATTACKS; CRYPTOGRAPHIC ALGORITHMS; CRYPTOGRAPHIC SCHEMES; SECRET INFORMATION; TAMPER-RESILIENCE; TAMPERPROOF;

EID: 79959937491     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22006-7_33     Document Type: Conference Paper
Times cited : (32)

References (18)
  • 1
    • 79959969612 scopus 로고    scopus 로고
    • The full version of this paper will be posted on the Cryptology ePrint Archive
    • The full version of this paper will be posted on the Cryptology ePrint Archive, http://eprint.iacr.org/
  • 2
    • 70350627587 scopus 로고    scopus 로고
    • Simultaneous hardcore bits and cryptography against memory attacks
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474-495. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 474-495
    • Akavia, A.1    Goldwasser, S.2    Vaikuntanathan, V.3
  • 3
    • 70350340328 scopus 로고    scopus 로고
    • Leakage-resilient public-key cryptography in the bounded-retrieval model
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Alwen, J., Dodis, Y., Wichs, D.: Leakage-resilient public-key cryptography in the bounded-retrieval model. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 36-54. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 36-54
    • Alwen, J.1    Dodis, Y.2    Wichs, D.3
  • 4
    • 0002380073 scopus 로고    scopus 로고
    • Tamper resistance: A cautionary note
    • USENIX Association, Berkeley
    • Anderson, R., Kuhn, M.: Tamper resistance: a cautionary note. In: WOEC 1996, p. 1. USENIX Association, Berkeley (1996)
    • (1996) WOEC 1996 , pp. 1
    • Anderson, R.1    Kuhn, M.2
  • 5
    • 35248884880 scopus 로고    scopus 로고
    • Fault based cryptanalysis of the advanced encryption standard (AES)
    • Wright, R.N. (ed.) FC 2003. Springer, Heidelberg
    • Blömer, J., Seifert, J.-P.: Fault based cryptanalysis of the advanced encryption standard (AES). In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 162-181. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2742 , pp. 162-181
    • Blömer, J.1    Seifert, J.-P.2
  • 6
    • 3042641393 scopus 로고    scopus 로고
    • On the importance of eliminating errors in cryptographic computations
    • Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of eliminating errors in cryptographic computations. J. Cryptology 14(2), 101-119 (2001)
    • (2001) J. Cryptology , vol.14 , Issue.2 , pp. 101-119
    • Boneh, D.1    DeMillo, R.A.2    Lipton, R.J.3
  • 8
    • 77949631657 scopus 로고    scopus 로고
    • Leakage-resilient signatures
    • Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
    • Faust, S., Kiltz, E., Pietrzak, K., Rothblum, G.N.: Leakage-resilient signatures. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 343-360. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 343-360
    • Faust, S.1    Kiltz, E.2    Pietrzak, K.3    Rothblum, G.N.4
  • 9
    • 77954640094 scopus 로고    scopus 로고
    • Protecting circuits from leakage: The computationally-bounded and noisy cases
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Faust, S., Rabin, T., Reyzin, L., Tromer, E., Vaikuntanathan, V.: Protecting circuits from leakage: the computationally-bounded and noisy cases. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 135-156. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 135-156
    • Faust, S.1    Rabin, T.2    Reyzin, L.3    Tromer, E.4    Vaikuntanathan, V.5
  • 10
    • 35048896529 scopus 로고    scopus 로고
    • Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
    • Naor, M. (ed.) TCC 2004. Springer, Heidelberg
    • Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., Rabin, T.: Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 258-277. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2951 , pp. 258-277
    • Gennaro, R.1    Lysyanskaya, A.2    Malkin, T.3    Micali, S.4    Rabin, T.5
  • 11
    • 77957009399 scopus 로고    scopus 로고
    • Securing computation against continuous leakage
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Goldwasser, S., Rothblum, G.N.: Securing computation against continuous leakage. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 59-79. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 59-79
    • Goldwasser, S.1    Rothblum, G.N.2
  • 12
    • 33746066725 scopus 로고    scopus 로고
    • Private circuits II: Keeping secrets in tamperable circuits
    • Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
    • Ishai, Y., Prabhakaran, M., Sahai, A., Wagner, D.: Private circuits II: Keeping secrets in tamperable circuits. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 308-327. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 308-327
    • Ishai, Y.1    Prabhakaran, M.2    Sahai, A.3    Wagner, D.4
  • 13
    • 35248830337 scopus 로고    scopus 로고
    • Private circuits: Securing hardware against probing attacks
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Ishai, Y., Sahai, A., Wagner, D.: Private circuits: Securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463-481. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 463-481
    • Ishai, Y.1    Sahai, A.2    Wagner, D.3
  • 14
    • 77957002505 scopus 로고    scopus 로고
    • Protecting cryptographic keys against continual leakage
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Juma, A., Vahlis, Y.: Protecting cryptographic keys against continual leakage. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 41-58. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 41-58
    • Juma, A.1    Vahlis, Y.2
  • 15
    • 72449205531 scopus 로고    scopus 로고
    • Signature schemes with bounded leakage resilience
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Katz, J., Vaikuntanathan, V.: Signature schemes with bounded leakage resilience. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 703-720. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 703-720
    • Katz, J.1    Vaikuntanathan, V.2
  • 16
    • 70350303869 scopus 로고    scopus 로고
    • Public-key cryptosystems resilient to key leakage
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 18-35. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 18-35
    • Naor, M.1    Segev, G.2
  • 18
    • 35248813476 scopus 로고    scopus 로고
    • Optical fault induction attacks
    • Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. Springer, Heidelberg
    • Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 2-12. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2523 , pp. 2-12
    • Skorobogatov, S.P.1    Anderson, R.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.