메뉴 건너뛰기




Volumn 7073 LNCS, Issue , 2011, Pages 722-739

Program obfuscation with leaky hardware

Author keywords

[No Author keywords available]

Indexed keywords

HARDWARE COMPONENTS; HARDWARE DEVICES; LOCAL STATE; PROGRAM OBFUSCATION; SECURITY PARAMETERS;

EID: 82955177044     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-25385-0_39     Document Type: Conference Paper
Times cited : (29)

References (33)
  • 2
    • 70350627587 scopus 로고    scopus 로고
    • Simultaneous hardcore bits and cryptography against memory attacks
    • Reingold, O. ed., Springer, Heidelberg
    • Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous Hardcore Bits and Cryptography against Memory Attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474-495. Springer, Heidelberg (2009)
    • (2009) TCC 2009. LNCS , vol.5444 , pp. 474-495
    • Akavia, A.1    Goldwasser, S.2    Vaikuntanathan, V.3
  • 3
    • 84955586754 scopus 로고    scopus 로고
    • Universal hashing and multiple authentication
    • Advances in Cryptology - CRYPTO '96
    • Atici, M., Stinson, D. R.: Universal Hashing and Multiple Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 16-30. Springer, Heidelberg (1996) (Pubitemid 126106227)
    • (1996) Lecture Notes in Computer Science , Issue.1109 , pp. 16-30
    • Atici, M.1    Stinson, D.R.2
  • 4
    • 57849098189 scopus 로고    scopus 로고
    • Universal arguments and their applications
    • Barak, B., Goldreich, O.: Universal arguments and their applications. SIAM J. Comput. 38(5), 1661-1694(2008)
    • (2008) SIAM J. Comput. , vol.38 , Issue.5 , pp. 1661-1694
    • Barak, B.1    Goldreich, O.2
  • 5
    • 0035163053 scopus 로고    scopus 로고
    • Resettably-sound zeroknowledge and its applications
    • Barak, B., Goldreich, O., Goldwasser, S., Lindell, Y.: Resettably-sound zeroknowledge and its applications. In: FOCS, pp. 116-125(2001)
    • (2001) FOCS , pp. 116-125
    • Barak, B.1    Goldreich, O.2    Goldwasser, S.3    Lindell, Y.4
  • 8
    • 77957007880 scopus 로고    scopus 로고
    • On strong simulation and composable point obfuscation
    • Rabin, T. ed., Springer, Heidelberg
    • Bitansky, N., Canetti, R.: On Strong Simulation and Composable Point Obfuscation. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 520-537. Springer, Heidelberg (2010)
    • (2010) CRYPTO 2010. LNCS , vol.6223 , pp. 520-537
    • Bitansky, N.1    Canetti, R.2
  • 13
    • 0013001552 scopus 로고    scopus 로고
    • Proactive security: Long-term Protection against break-ins
    • Canetti, R., Gennaro, R., Herzberg, A., Naor, D.: Proactive security: Long-term Protection against break-ins. CryptoBytes 3(1) (1997)
    • (1997) CryptoBytes , vol.3 , Issue.1
    • Canetti, R.1    Gennaro, R.2    Herzberg, A.3    Naor, D.4
  • 14
    • 0033723965 scopus 로고    scopus 로고
    • Resettable zero-knowledge (extended abstract)
    • Canetti, R., Goldreich, O., Goldwasser, S., Micali, S.: Resettable zero-knowledge (extended abstract). In: STOC, pp. 235-244(2000)
    • (2000) STOC , pp. 235-244
    • Canetti, R.1    Goldreich, O.2    Goldwasser, S.3    Micali, S.4
  • 15
    • 77949622814 scopus 로고    scopus 로고
    • Obfuscation of hyperplane membership
    • Micciancio, D. ed., Springer, Heidelberg
    • Canetti, R., Rothblum, G. N., Varia, M.: Obfuscation of Hyperplane Membership. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 72-89. Springer, Heidelberg (2010)
    • (2010) TCC 2010. LNCS , vol.5978 , pp. 72-89
    • Canetti, R.1    Rothblum, G.N.2    Varia, M.3
  • 16
    • 57949107348 scopus 로고    scopus 로고
    • Leakage-resilient cryptography
    • IEEE Computer Society
    • Dziembowski, S., Pietrzak, K.: Leakage-resilient cryptography. In: 49th FOCS - 2008, pp. 293-302. IEEE Computer Society (2008)
    • (2008) 49th FOCS - 2008 , pp. 293-302
    • Dziembowski, S.1    Pietrzak, K.2
  • 17
    • 77954640094 scopus 로고    scopus 로고
    • Protecting circuits from leakage: The computationally-bounded and noisy cases
    • Gilbert, H. ed., Springer, Heidelberg
    • Faust, S., Rabin, T., Reyzin, L., Tromer, E., Vaikuntanathan, V.: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 135-156. Springer, Heidelberg (2010)
    • (2010) EUROCRYPT 2010. LNCS , vol.6110 , pp. 135-156
    • Faust, S.1    Rabin, T.2    Reyzin, L.3    Tromer, E.4    Vaikuntanathan, V.5
  • 19
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious rams. J. ACM 43(3), 431-473(1996) (Pubitemid 126607640)
    • (1996) Journal of the ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 21
    • 51849168583 scopus 로고    scopus 로고
    • One-time programs
    • Wagner, D. ed., Springer, Heidelberg
    • Goldwasser, S., Kalai, Y. T., Rothblum, G. N.: One-Time Programs. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 39-56. Springer, Heidelberg (2008)
    • (2008) CRYPTO 2008. LNCS , vol.5157 , pp. 39-56
    • Goldwasser, S.1    Kalai, Y.T.2    Rothblum, G.N.3
  • 23
    • 38049015775 scopus 로고    scopus 로고
    • On best-possible obfuscation
    • Vadhan, S. P. ed., Springer, Heidelberg
    • Goldwasser, S., Rothblum, G. N.: On Best-Possible Obfuscation. In: Vadhan, S. P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 194-213. Springer, Heidelberg (2007)
    • (2007) TCC 2007. LNCS , vol.4392 , pp. 194-213
    • Goldwasser, S.1    Rothblum, G.N.2
  • 24
    • 77957009399 scopus 로고    scopus 로고
    • Securing computation against continuous leakage
    • Rabin, T. ed., Springer, Heidelberg
    • Goldwasser, S., Rothblum, G. N.: Securing Computation against Continuous Leakage. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 59-79. Springer, Heidelberg (2010)
    • (2010) CRYPTO 2010. LNCS , vol.6223 , pp. 59-79
    • Goldwasser, S.1    Rothblum, G.N.2
  • 25
    • 77949605211 scopus 로고    scopus 로고
    • Founding cryptography on tamper-proof hardware tokens
    • Micciancio, D. ed., Springer, Heidelberg
    • Goyal, V., Ishai, Y., Sahai, A., Venkatesan, R., Wadia, A.: Founding Cryptography on Tamper-Proof Hardware Tokens. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 308-326. Springer, Heidelberg (2010)
    • (2010) TCC 2010. LNCS , vol.5978 , pp. 308-326
    • Goyal, V.1    Ishai, Y.2    Sahai, A.3    Venkatesan, R.4    Wadia, A.5
  • 26
    • 38049056625 scopus 로고    scopus 로고
    • Obfuscation for cryptographic purposes
    • Vadhan, S. P. ed., Springer, Heidelberg
    • Hofheinz, D., Malone-Lee, J., Stam, M.: Obfuscation for Cryptographic Purposes. In: Vadhan, S. P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 214-232. Springer, Heidelberg (2007)
    • (2007) TCC 2007. LNCS , vol.4392 , pp. 214-232
    • Hofheinz, D.1    Malone-Lee, J.2    Stam, M.3
  • 27
    • 77957002505 scopus 로고    scopus 로고
    • Protecting cryptographic keys against continual leakage
    • Rabin, T. ed., Springer, Heidelberg
    • Juma, A., Vahlis, Y.: Protecting Cryptographic Keys against Continual Leakage. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 41-58. Springer, Heidelberg (2010)
    • (2010) CRYPTO 2010. LNCS , vol.6223 , pp. 41-58
    • Juma, A.1    Vahlis, Y.2
  • 29
    • 35048852134 scopus 로고    scopus 로고
    • Physically Observable Cryptography
    • Theory of Cryptography First Theory of Cryptography Conference, TCC 2004 Cambridge, MA, USA, February 19-21, 2004 Proceedings
    • Micali, S., Reyzin, L.: Physically Observable Cryptography. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 278-296. Springer, Heidelberg (2004) (Pubitemid 38236631)
    • (2004) Lecture Notes in Computer Science , Issue.2951 , pp. 278-296
    • Micali, S.1    Reyzin, L.2
  • 33
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • DOI 10.1016/0022-0000(81)90033-7
    • Wegman, M., Carter, L.: New hash functions and their use in authentication and set equality. J. of Computer and System Sciences 22, 265-279(1981) (Pubitemid 12444638)
    • (1981) Journal of Computer and System Sciences , vol.22 , Issue.3 , pp. 265-279
    • Wegman Mark, N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.