Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
暂无分享,去创建一个
Vinod Vaikuntanathan | Tal Rabin | Eran Tromer | Leonid Reyzin | Sebastian Faust | Eran Tromer | T. Rabin | V. Vaikuntanathan | Sebastian Faust | L. Reyzin
[1] David Brumley,et al. Remote timing attacks are practical , 2003, Comput. Networks.
[2] Yael Tauman Kalai,et al. One-Time Programs , 2008, CRYPTO.
[3] Eran Tromer,et al. Acoustic cryptanalysis : on nosy people and noisy machines , 2004 .
[4] Vinod Vaikuntanathan,et al. Signature Schemes with Bounded Leakage Resilience , 2009, ASIACRYPT.
[5] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[6] Moti Yung,et al. A block cipher based pseudo random number generator secure against side-channel key recovery , 2008, ASIACCS '08.
[7] Silvio Micali,et al. Physically Observable Cryptography (Extended Abstract) , 2004, TCC.
[8] Markus G. Kuhn,et al. Compromising Emanations , 2005, Encyclopedia of Cryptography and Security.
[9] Yevgeniy Dodis,et al. Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model , 2009, CRYPTO.
[10] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[11] Guy N. Rothblum,et al. Leakage-Resilient Signatures , 2010, TCC.
[12] Yuval Ishai,et al. On the randomness complexity of efficient sampling , 2006, STOC '06.
[13] Michael Sipser,et al. Parity, circuits, and the polynomial-time hierarchy , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[14] Colin Percival. CACHE MISSING FOR FUN AND PROFIT , 2005 .
[15] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[16] Moni Naor,et al. Public-Key Cryptosystems Resilient to Key Leakage , 2009, SIAM J. Comput..
[17] Avi Wigderson,et al. On span programs , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.
[18] Vinod Vaikuntanathan,et al. Simultaneous Hardcore Bits and Cryptography against Memory Attacks , 2009, TCC.
[19] Miklós Ajtai,et al. ∑11-Formulae on finite structures , 1983, Ann. Pure Appl. Log..
[20] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[21] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[22] Adi Shamir,et al. How to share a secret , 1979, CACM.
[23] Stefan Dziembowski,et al. Leakage-Resilient Storage , 2010, SCN.
[24] Johan Håstad,et al. Almost optimal lower bounds for small depth circuits , 1986, STOC '86.
[25] Daniel J. Bernstein,et al. Cache-timing attacks on AES , 2005 .
[26] Yael Tauman Kalai,et al. On cryptography with auxiliary input , 2009, STOC '09.
[27] Stefan Dziembowski,et al. Leakage-Resilient Cryptography , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.
[28] Krzysztof Pietrzak,et al. A Leakage-Resilient Mode of Operation , 2009, EUROCRYPT.
[29] Oded Goldreich,et al. Towards a theory of software protection and simulation by oblivious RAMs , 1987, STOC.
[30] A. Razborov. Lower bounds on the size of bounded depth circuits over a complete basis with logical addition , 1987 .
[31] Miklós Ajtai,et al. Approximate Counting with Uniform Constant-Depth Circuits , 1990, Advances In Computational Complexity Theory.
[32] Roman Smolensky,et al. Algebraic methods in the theory of lower bounds for Boolean circuit complexity , 1987, STOC.
[33] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[34] Yuval Ishai,et al. Private Circuits: Securing Hardware against Probing Attacks , 2003, CRYPTO.