نتایج جستجو برای: tamper resilient cryptography

تعداد نتایج: 54844  

Journal: :IACR Cryptology ePrint Archive 2008
Stefan Dziembowski Krzysztof Pietrzak

We construct a stream-cipher S whose implementation is secure even if arbitrary (adversely chosen) information on the internal state of S is leaked during computation. This captures all possible side-channel attacks on S where the amount of information leaked in a given period is bounded, but overall can be arbitrary large, in particular much larger than the internal state of S. The only other ...

Journal: :Computers 2021

Distributed ledger technologies (DLT), including blockchains, combine the use of cryptography and distributed networks to achieve a novel form records creation keeping designed for tamper-resistance immutability. Over past several years, these capabilities have made DLTs, increasingly popular as general-purpose technology used recordkeeping in variety sectors industry domains, yet many open cha...

1997
Oded Goldreich Birgit Pfitzmann Ronald L. Rivest

We introduce delegation schemes wherein a user may delegate certain rights to himself, but may not safely delegate these rights to others. In our motivating application, a user has a primary (long-term) key that receives some personalized access rights, yet the user may reasonably wish to delegate these rights to new secondary (short-term) keys he creates to use on his laptop when traveling, to...

Journal: :IACR Cryptology ePrint Archive 2016
Antonio Faonio Daniele Venturi

We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks. For signatures we obtain the first construction in the standard model; for public-key encryption we obtain the first construction free of pairing (avoiding non-interactive zero-knowledge proofs). Our constructions are based on generic...

2011
Sebastian Faust Krzysztof Pietrzak Daniele Venturi

Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that the tampered device will reveal secret information. Inspired by the work of Ishai et al. [Eurocrypt’06], we propose a compiler that transforms any circuit into a new circuit with the same functionality, but which is resilient ...

2006
Claude Carlet Andrew Klapper

Bent and resilient functions play significant roles in cryptography, coding theory, and combinatorics. However, the numbers of bent and resilient functions on a given number of variables are not known. Even a reasonable bound on the number of bent functions is not known and the best known bound on the number of resilient functions seems weak for functions of high orders. In this paper we presen...

2015
Pratyay Mukherjee

In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous w...

2006
SPÄRCK JONES

A seal is only as good as the man in whose briefcase it's carried. —KAREN SPÄRCK JONES 12.1 Introduction Many computer systems rely to some extent on secure printing, packaging, and seals to guarantee important aspects of their protection. • Many software products get some protection against forgery, using tricks such as holographic stickers that are supposed to tear when removed from the packa...

Journal: :Wasit journal of computer and mathematics science 2022

Blocks and chains are the building blocks of blockchain, which is a community network. two terms used to describe collections data information. The most fundamental need for blockchain that these postings be connected by cryptography, case here. Cryptography. entries in each block added as list grows. Although concept cryptography difficult, we have made it easier you understand. Asymmetric-key...

2002
Sharad Goel Mark Robson Milo Polte Emin Gün Sirer

Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. In this paper, we describe Herbivore, a peer-to-peer, scalable, tamper-resilient communication system that provides provable anonymity and privacy. Building on dining cryptographer networks, Herbivore scales by partitioning the network into anonymizing cliques. Adversaries able to monitor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید