搜索结果: 1-5 共查到“军队指挥学 Tamper-resilience”相关记录5条 . 查询时间(0.078 秒)
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
public-key encryption signatures related-key attacks
2016/5/30
We revisit the question of constructing public-key encryption and signature schemes with
security in the presence of bounded leakage and tampering memory attacks. For signatures
we obtain the first ...
Bounded Tamper Resilience: How to go beyond the Algebraic Barrier
bounded tamper resilience public key encryption
2014/3/6
Related key attacks (RKAs) are powerful cryptanalytic attacks where an adversary can change the secret key and observe the effect of such changes at the output. The state of the art in RKA security pr...
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
foundations tamper resilience compiler
2011/7/25
Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that the tampered device will reve...
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
foundations / tamper resilience compiler
2012/3/27
Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that the tampered device will reve...
BiTR: Built-in Tamper Resilience
tamper-proof hardware tamper resilience universal composability secure computation non-malleable codes
2010/10/11
In this paper we put forward the notion of Built-in Tamper Resilience (BiTR) for cryptographic protocols, capturing the idea that the protocol that is encapsulated in a hardware token preserves its se...