Cryptography with tamperable and leaky memory

    CRYPTO, pp. 373-390, 2011.

    Cited by: 60|Bibtex|Views6|Links
    EI
    Keywords:
    memory updatescontinual leakagelinear assumptioncontinual leakage regimeanalogous modelMore(6+)

    Abstract:

    A large and growing body of research has sought to secure cryptographic systems against physical attacks. Motivated by a large variety of real-world physical attacks on memory, an important line of work was initiated by Akavia, Goldwasser, and Vaikuntanathan [1] where security is sought under the assumptions that: (1) all memory is leaky,...More

    Code:

    Data:

    Your rating :
    0

     

    Tags
    Comments