Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering
暂无分享,去创建一个
Silvio Micali | Tal Malkin | Tal Rabin | Rosario Gennaro | Anna Lysyanskaya | S. Micali | T. Rabin | Anna Lysyanskaya | R. Gennaro | T. Malkin
[1] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[2] Ross J. Anderson,et al. Optical Fault Induction Attacks , 2002, CHES.
[3] Jean-Jacques Quisquater,et al. A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge , 1988, CRYPTO.
[4] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[5] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[6] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[7] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[8] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[9] Andrew Odlyzko,et al. Advances in Cryptology — CRYPTO’ 86 , 2000, Lecture Notes in Computer Science.
[10] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[11] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[12] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[13] Ronald Cramer,et al. Signature schemes based on the strong RSA assumption , 1999, CCS '99.
[14] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[15] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[16] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[17] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[18] Yuval Ishai,et al. Private Circuits: Securing Hardware against Probing Attacks , 2003, CRYPTO.
[19] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[20] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[21] Silvio Micali,et al. Physically Observable Cryptography , 2003, IACR Cryptol. ePrint Arch..
[22] Shai Halevi,et al. Secure Hash-and-Sign Signatures Without the Random Oracle , 1999, EUROCRYPT.
[23] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[24] Shafi Goldwasser,et al. Advances in Cryptology — CRYPTO’ 88: Proceedings , 1990, Lecture Notes in Computer Science.
[25] Joan Feigenbaum,et al. Advances in Cryptology-Crypto 91 , 1992 .
[26] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[27] Ronald Cramer,et al. Signature schemes based on the strong RSA assumption , 2000, TSEC.
[28] Dan Boneh,et al. Advances in Cryptology - CRYPTO 2003 , 2003, Lecture Notes in Computer Science.
[29] Ran Canetti,et al. Resettable zero-knowledge (extended abstract) , 2000, STOC '00.
[30] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.