Authenticated broadcast with a partially compromised public-key infrastructure
暂无分享,去创建一个
Jonathan Katz | Arkady Yerukhimovich | Ranjit Kumaresan | S. Dov Gordon | Jonathan Katz | R. Kumaresan | S. D. Gordon | Arkady Yerukhimovich
[1] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[2] Matthias Fitzi,et al. Multi-party Computation with Hybrid Security , 2004, EUROCRYPT.
[3] Rafail Ostrovsky,et al. How To Withstand Mobile Virus Attacks , 1991, PODC 1991.
[4] Matthias Fitzi,et al. Generalized communication and security models in Byzantine agreement , 2002 .
[5] Rafail Ostrovsky,et al. How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.
[6] Stefan Dziembowski,et al. Leakage-Resilient Cryptography , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.
[7] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[8] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[9] Martin Hirt,et al. Player-Centric Byzantine Agreement , 2011, ICALP.
[10] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[11] David Brumley,et al. Remote timing attacks are practical , 2003, Comput. Networks.
[12] Yehuda Lindell,et al. Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .
[13] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[14] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[15] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[16] Danny Dolev,et al. Authenticated Algorithms for Byzantine Agreement , 1983, SIAM J. Comput..
[17] K. Srinathan,et al. Authenticated Byzantine Generals in Dual Failure Model , 2010, ICDCN.
[18] Matthias Fitzi,et al. From partial consistency to global broadcast , 2000, STOC '00.
[19] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[20] Phong Q. Nguyen. Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3 , 2004, EUROCRYPT.
[21] Piotr Berman,et al. Towards optimal distributed consensus , 1989, 30th Annual Symposium on Foundations of Computer Science.