Secure Computation Using Leaky Tokens
暂无分享,去创建一个
[1] Stefan Dziembowski,et al. Leakage-Resilient Cryptography , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.
[2] Aggelos Kiayias,et al. BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..
[3] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[4] Gil Segev,et al. David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware , 2008, EUROCRYPT.
[5] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[6] Joe Kilian. More general completeness theorems for secure two-party computation , 2000, STOC '00.
[7] David Brumley,et al. Remote timing attacks are practical , 2003, Comput. Networks.
[8] Amit Sahai,et al. A Full Characterization of Completeness for Two-Party Randomized Function Evaluation , 2014, EUROCRYPT.
[9] Moni Naor,et al. Basing cryptographic protocols on tamper-evident seals , 2010, Theor. Comput. Sci..
[10] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[11] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[12] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[13] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[14] Joe Kilian,et al. A general completeness theorem for two party games , 1991, STOC '91.
[15] Rudolf Ahlswede,et al. Founding Cryptography on Oblivious Transfer , 2016 .
[16] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[17] Yuval Ishai,et al. Founding Cryptography on Tamper-Proof Hardware Tokens , 2010, IACR Cryptol. ePrint Arch..
[18] Yuval Ishai,et al. Private Circuits: Securing Hardware against Probing Attacks , 2003, CRYPTO.
[19] Silvio Micali,et al. Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering , 2004, TCC.
[20] Ronald Cramer,et al. Improved Privacy in Wallets with Observers (Extended Abstract) , 1994, EUROCRYPT.
[21] Stefan A. Brands,et al. Untraceable Off-line Cash in Wallet with Observers , 2002 .
[22] Jonathan Katz,et al. Universally Composable Multi-party Computation Using Tamper-Proof Hardware , 2007, EUROCRYPT.
[23] Amit Sahai,et al. Leakage-Resilient Zero Knowledge , 2011, CRYPTO.
[24] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[25] Vipul Goyal,et al. Lower Bounds in the Hardware Token Model , 2013, IACR Cryptol. ePrint Arch..
[26] Vladimir Kolesnikov,et al. Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens , 2010, TCC.
[27] Ivan Damgård,et al. Isolated Proofs of Knowledge and Isolated Zero Knowledge , 2008, EUROCRYPT.
[28] Nico Döttling,et al. Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token , 2011, TCC.
[29] Oded Goldreich,et al. The Foundations of Cryptography - Volume 1: Basic Techniques , 2001 .
[30] Jörn Müller-Quade,et al. Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions , 2010, TCC.
[31] Amit Sahai,et al. New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation , 2012, IACR Cryptol. ePrint Arch..
[32] Yuval Ishai,et al. Private Circuits II: Keeping Secrets in Tamperable Circuits , 2006, EUROCRYPT.
[33] Yael Tauman Kalai,et al. One-Time Programs , 2008, CRYPTO.
[34] Silvio Micali,et al. Physically Observable Cryptography (Extended Abstract) , 2004, TCC.
[35] Yael Tauman Kalai,et al. Program Obfuscation with Leaky Hardware , 2011, IACR Cryptol. ePrint Arch..
[36] Amit Sahai,et al. New Constructions for UC Secure Computation Using Tamper-Proof Hardware , 2008, EUROCRYPT.