Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk) (English)
- New search for: Standaert, François-Xavier
- New search for: Malkin, Tal G.
- New search for: Yung, Moti
- New search for: Standaert, François-Xavier
- New search for: Malkin, Tal G.
- New search for: Yung, Moti
In:
Information Theoretic Security
3
;
70
;
2008
- Article/Chapter (Book) / Electronic Resource
-
Title:Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk)
-
Contributors:
-
Published in:Information Theoretic Security , 3 ; 70Lecture Notes in Computer Science ; 5155, 3 ; 70
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2008-01-01
-
Size:1 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Partially Connected Networks: Information Theoretically Secure Protocols and Open Problems (Invited Talk)Garay, Juan A. et al. | 2008
- 2
-
Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message DecryptionAraki, Toshinori et al. | 2008
- 3
-
Interactive Hashing: An Information Theoretic Tool (Invited Talk)Crépeau, Claude / Kilian, Joe / Savvides, George et al. | 2008
- 4
-
Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised NetworkBeals, Travis R. / Sanders, Barry C. et al. | 2008
- 5
-
Strong Secrecy for Wireless Channels (Invited Talk)Barros, João / Bloch, Matthieu et al. | 2008
- 6
-
Efficient Key Predistribution for Grid-Based Wireless Sensor NetworksBlackburn, Simon R. / Etzion, Tuvi / Martin, Keith M. / Paterson, Maura B. et al. | 2008
- 70
-
Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk)Standaert, François-Xavier / Malkin, Tal G. / Yung, Moti et al. | 2008
- 8
-
A Single Initialization Server for Multi-party CryptographyBlier, Hugue / Tapp, Alain et al. | 2008
- 9
-
Statistical Security Conditions for Two-Party Secure Function EvaluationCrépeau, Claude / Wullschleger, Jürg et al. | 2008
- 10
-
Upper Bounds for Set Systems with the Identifiable Parent PropertyCollins, Michael J. et al. | 2008
- 11
-
Oblivious Transfer Based on the McEliece AssumptionsDowsley, Rafael / van de Graaf, Jeroen / Müller-Quade, Jörn / Nascimento, Anderson C. A. et al. | 2008
- 118
-
List Error-Correction with Optimal Information Rate (Invited Talk)Guruswami, Venkatesan et al. | 2008
- 13
-
Theory of Quantum Key Distribution: The Road Ahead (Invited Talk)Lütkenhaus, Norbert et al. | 2008
- 14
-
Susceptible Two-Party Quantum ComputationsJakoby, Andreas / Liśkiewicz, Maciej / Mądry, Aleksander et al. | 2008
- 15
-
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed AdversaryChoudhary, Ashish / Patra, Arpita / Ashwinkumar, B. V. / Srinathan, K. / Rangan, C. Pandu et al. | 2008
- 16
-
Key Refreshing in Wireless Sensor NetworksBlackburn, Simon R. / Martin, Keith M. / Paterson, Maura B. / Stinson, Douglas R. et al. | 2008
- 17
-
Efficient Traitor Tracing from Collusion Secure CodesBillet, Olivier / Phan, Duong Hieu et al. | 2008
- 183
-
Revisiting the Karnin, Greene and Hellman BoundsDesmedt, Yvo / King, Brian / Schoenmakers, Berry et al. | 2008
- 19
-
Simple Direct Reduction of String (1,2)-OT to Rabin’s OT without Privacy AmplificationKurosawa, Kaoru / Koshiba, Takeshi et al. | 2008
- 20
-
The Complexity of Distinguishing Distributions (Invited Talk)Baignères, Thomas / Vaudenay, Serge et al. | 2008
- 21
-
Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk)Hanaoka, Goichiro et al. | 2008
- 22
-
A Proof of Security in O(2n) for the Xor of Two Random PermutationsPatarin, Jacques et al. | 2008