메뉴 건너뛰기




Volumn , Issue , 2012, Pages 31-40

How to compute in the presence of leakage

Author keywords

[No Author keywords available]

Indexed keywords

BLACK BOXES; CRYPTOGRAPHIC ALGORITHMS; EQUIVALENT ALGORITHM; FOLLOWING PROBLEM; HARDWARE COMPONENTS; INPUT-OUTPUT BEHAVIOR; INPUT/OUTPUT BEHAVIORS; INTERNAL STATE; PARTIAL INFORMATION; RUNNING TIME; SEARCH ALGORITHMS; SECURITY PARAMETERS; SIDE CHANNEL ATTACK;

EID: 84871955532     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FOCS.2012.34     Document Type: Conference Paper
Times cited : (38)

References (26)
  • 2
    • 84871949546 scopus 로고    scopus 로고
    • Personal communication
    • R. Impagliazzo, "Personal communication," 2010.
    • (2010)
    • Impagliazzo, R.1
  • 3
    • 35248830337 scopus 로고    scopus 로고
    • Private circuits: Securing hardware against probing attacks
    • Y. Ishai, A. Sahai, and D. Wagner, "Private circuits: Securing hardware against probing attacks," in CRYPTO, 2003, pp. 463-481.
    • CRYPTO, 2003 , pp. 463-481
    • Ishai, Y.1    Sahai, A.2    Wagner, D.3
  • 4
    • 77954640094 scopus 로고    scopus 로고
    • Protecting circuits from leakage: The computationally-bounded and noisy cases
    • S. Faust, T. Rabin, L. Reyzin, E. Tromer, and V. Vaikuntanathan, "Protecting circuits from leakage: the computationally-bounded and noisy cases," in EUROCRYPT, 2010, pp. 135-156.
    • EUROCRYPT, 2010 , pp. 135-156
    • Faust, S.1    Rabin, T.2    Reyzin, L.3    Tromer, E.4    Vaikuntanathan, V.5
  • 5
    • 35048852134 scopus 로고    scopus 로고
    • Physically observable cryptography (extended abstract)
    • S. Micali and L. Reyzin, "Physically observable cryptography (extended abstract)," in TCC, 2004, pp. 278-296.
    • TCC, 2004 , pp. 278-296
    • Micali, S.1    Reyzin, L.2
  • 6
    • 77957009399 scopus 로고    scopus 로고
    • Securing computation against continuous leakage
    • S. Goldwasser and G. N. Rothblum, "Securing computation against continuous leakage," in CRYPTO, 2010, pp. 59-79.
    • CRYPTO, 2010 , pp. 59-79
    • Goldwasser, S.1    Rothblum, G.N.2
  • 7
    • 77957002505 scopus 로고    scopus 로고
    • Protecting cryptographic keys against continual leakage
    • A. Juma and Y. Vahlis, "Protecting cryptographic keys against continual leakage," in CRYPTO, 2010, pp. 41-58.
    • CRYPTO, 2010 , pp. 41-58
    • Juma, A.1    Vahlis, Y.2
  • 8
    • 84858320781 scopus 로고    scopus 로고
    • Leakage-resilient circuits without computational assumptions
    • S. Dziembowski and S. Faust, "Leakage-resilient circuits without computational assumptions," in TCC, 2012, pp. 230-247.
    • TCC, 2012 , pp. 230-247
    • Dziembowski, S.1    Faust, S.2
  • 9
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • O. Goldreich and R. Ostrovsky, "Software protection and simulation on oblivious RAMs," J. ACM, vol. 43, no. 3, pp. 431-473, 1996.
    • (1996) J. ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 10
    • 79959763972 scopus 로고    scopus 로고
    • Secure computation with information leaking to an adversary
    • M. Ajtai, "Secure computation with information leaking to an adversary," in STOC, 2011.
    • STOC, 2011
    • Ajtai, M.1
  • 12
    • 57949107348 scopus 로고    scopus 로고
    • Leakage-resilient cryptography
    • S. Dziembowski and K. Pietrzak, "Leakage-resilient cryptography," in FOCS, 2008, pp. 293-302.
    • FOCS, 2008 , pp. 293-302
    • Dziembowski, S.1    Pietrzak, K.2
  • 13
    • 67650675583 scopus 로고    scopus 로고
    • A leakage-resilient mode of operation
    • K. Pietrzak, "A leakage-resilient mode of operation," in EUROCRYPT, 2009, pp. 462-482.
    • EUROCRYPT, 2009 , pp. 462-482
    • Pietrzak, K.1
  • 15
    • 78751478860 scopus 로고    scopus 로고
    • Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage
    • Z. Brakerski, Y. T. Kalai, J. Katz, and V. Vaikuntanathan, "Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage," in FOCS, 2010, pp. 501-510.
    • FOCS, 2010 , pp. 501-510
    • Brakerski, Z.1    Kalai, Y.T.2    Katz, J.3    Vaikuntanathan, V.4
  • 17
    • 79959732277 scopus 로고    scopus 로고
    • Achieving leakage resilience through dual system encryption
    • A. Lewko, Y. Rouselakis, and B. Waters, "Achieving leakage resilience through dual system encryption," in TCC, 2011.
    • TCC, 2011
    • Lewko, A.1    Rouselakis, Y.2    Waters, B.3
  • 19
    • 84863311631 scopus 로고    scopus 로고
    • Storing secrets on continually leaky devices
    • Y. Dodis, A. B. Lewko, B. Waters, and D. Wichs, "Storing secrets on continually leaky devices," in FOCS, 2011, pp. 688-697.
    • FOCS, 2011 , pp. 688-697
    • Dodis, Y.1    Lewko, A.B.2    Waters, B.3    Wichs, D.4
  • 23
    • 79953188688 scopus 로고    scopus 로고
    • After-the-fact leakage in public-key encryption
    • S. Halevi and H. Lin, "After-the-fact leakage in public-key encryption," in TCC, 2011, pp. 107-124.
    • TCC, 2011 , pp. 107-124
    • Halevi, S.1    Lin, H.2
  • 24
    • 51849118137 scopus 로고    scopus 로고
    • Circular-secure encryption from decision diffie-hellman
    • D. Boneh, S. Halevi, M. Hamburg, and R. Ostrovsky, "Circular-secure encryption from decision diffie-hellman," in CRYPTO, 2008, pp. 108-125.
    • CRYPTO, 2008 , pp. 108-125
    • Boneh, D.1    Halevi, S.2    Hamburg, M.3    Ostrovsky, R.4
  • 25
    • 70350303869 scopus 로고    scopus 로고
    • Public-key cryptosystems resilient to key leakage
    • M. Naor and G. Segev, "Public-key cryptosystems resilient to key leakage," in CRYPTO, 2009, pp. 18-35.
    • CRYPTO, 2009 , pp. 18-35
    • Naor, M.1    Segev, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.