Private Circuits: Securing Hardware against Probing Attacks
- 1 January 2003
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 27 references indexed in Scilit:
- Maintaining Security in the Presence of Transient FaultsPublished by Springer Science and Business Media LLC ,2007
- On the (Im)possibility of Obfuscating ProgramsLecture Notes in Computer Science, 2001
- Exposure-Resilient Functions and All-or-Nothing TransformsLecture Notes in Computer Science, 2000
- General Secure Multi-party Computation from any Linear Secret-Sharing SchemeLecture Notes in Computer Science, 2000
- On Boolean and Arithmetic Masking against Differential Power AnalysisLecture Notes in Computer Science, 2000
- Security and Composition of Multiparty Cryptographic ProtocolsJournal of Cryptology, 2000
- Towards Sound Approaches to Counteract Power-Analysis AttacksLecture Notes in Computer Science, 1999
- On the Importance of Checking Cryptographic Protocols for FaultsLecture Notes in Computer Science, 1997
- Completeness theorems for non-cryptographic fault-tolerant distributed computationPublished by Association for Computing Machinery (ACM) ,1988
- An 0(n log n) sorting networkPublished by Association for Computing Machinery (ACM) ,1983