نتایج جستجو برای: tampering
تعداد نتایج: 1480 فیلتر نتایج به سال:
Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that the tampered device will reveal secret information. Inspired by the work of Ishai et al. [Eurocrypt’06], we propose a compiler that transforms any circuit into a new circuit with the same functionality, but which is resilient ...
Purpose How do organisations know which problems are worthy of their attention? Despite good intentions, many attempts to solve fail. One reason for this failure might be because non-problems or with insufficient means, a concept proposed by Deming as tampering. The purpose paper is suggest definition tampering, outline what currently known about possible practical implications tampering and ho...
Non-malleable codes, introduced by Dziembowski, Pietrzak, and Wichs (ICS ’10) provide the guarantee that if a codeword c of a message m, is modified by a tampering function f to c′, then c′ either decodes to m or to “something unrelated” to m. It is known that non-malleable codes cannot exist for the class of all tampering functions and hence a lot of work has focused on explicitly constructing...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید