Cryptography with tamperable and leaky memory
CRYPTO, pp. 373-390, 2011.
memory updatescontinual leakagelinear assumptioncontinual leakage regimeanalogous modelMore(6+)
A large and growing body of research has sought to secure cryptographic systems against physical attacks. Motivated by a large variety of real-world physical attacks on memory, an important line of work was initiated by Akavia, Goldwasser, and Vaikuntanathan  where security is sought under the assumptions that: (1) all memory is leaky,...More