• No results found

tamper-proof hardware

David &  Goliath  Oblivious  Affine  Function  Evaluation -  Asymptotically  Optimal  Building  Blocks  for  Universally  Composable  Two-Party  Computation  from  a  Single  Untrusted  Stateful  Tamper-Proof  Hardware  Token

David & Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token

... In this paper, we showed that exchange of a single untrusted tamper-proof hardware token is suffi- cient for general, universally composable, information-theoretically secure two-party computation. ...

58

Composable  Security  in  the  Tamper  Proof  Hardware  Model  under  Minimal  Complexity

Composable Security in the Tamper Proof Hardware Model under Minimal Complexity

... Unidirectional token exchange. Consider the scenario where companies such as Amazon or Google wish to provide an email spam-detection service and users of this service want to keep their emails private (so as to not have ...

63

Weakening  the  Isolation  Assumption  of  Tamper-proof  Hardware  Tokens

Weakening the Isolation Assumption of Tamper-proof Hardware Tokens

... is used to send the commitments and the ciphertexts. Note that such a version of the protocol would not be secure in the setting where one-way communication is allowed into the token since Goliath could simply forward ...

19

Modeling Elliptical Curve Cryptography Keys using Back Propagation Algorithm

Modeling Elliptical Curve Cryptography Keys using Back Propagation Algorithm

... Temper proof devices/ Temper resistance devices are secure computing platform consisting of tamper proof hardware and firmware having processing and storage ...timing. Tamper ...

5

Non-Malleable  Multi-Prover  Interactive  Proofs   and  Witness  Signatures

Non-Malleable Multi-Prover Interactive Proofs and Witness Signatures

... two tamper proof hardware ...single hardware token, because then the single token would be solely responsible for giving an (unconditional) witness hiding proof for NP, which is ...

40

Universally  Composable  Secure  Computation  with  Corrupted  Tokens

Universally Composable Secure Computation with Corrupted Tokens

... of tamper-proof hardware ...using tamper-proof signature cards as the setup ...of tamper-proof hardware tokens was given by Katz ...Katz’s ...

40

Tamper  Detection   and  Continuous  Non-Malleable  Codes

Tamper Detection and Continuous Non-Malleable Codes

... Non-malleable codes offer strong protection against tampering. By encoding the data on an device with a non- malleable code for F, we ensure that an attacker cannot learn anything more by tampering with the data on the ...

24

A  Tamper   and  Leakage  Resilient  von  Neumann  Architecture

A Tamper and Leakage Resilient von Neumann Architecture

... One may object that given such a powerful tamper-proof component a solution for tamper and leakage resilience is simple. Let us take a look at an adversary that can apply powerful tampering functions ...

44

Tamper   and  Leakage  Resilience  in  the  Split-State  Model

Tamper and Leakage Resilience in the Split-State Model

... zero-knowledge proof, or an MPC protocol, can also be modeled as a stateful cryptographic functionality; the initial state s would represent its input and random tape; while the supplied input x would represent a ...

30

Impossibility  on  Tamper-Resilient  Cryptography  with  Uniqueness  Properties

Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties

... its tamper-resilience from any assumption captured by the notion of a restricted cryptographic game ...weak tamper-resilience, where an adversary only makes one tampering query and one decryption ...

38

Proof  of  Activity:  Extending  Bitcoins  Proof  of  Work  via  Proof  of  Stake

Proof of Activity: Extending Bitcoins Proof of Work via Proof of Stake

... a Proof of Work based cryptocurrency should not be expected to make this ratio better, unlike Proof of Stake based protocols such as PoA, because the entities that secure the PoA network have fewer expenses ...

19

A26361 D1332 Z180 UK pdf

A26361 D1332 Z180 UK pdf

... 500mA and power supervision with over current detection Data negative port C Data positive port C.. GND Data positive port D.[r] ...

19

73824409 pdf

73824409 pdf

... specifications. Hardware and software designed to be used with any given Printed Board Assembly (PBA) and BIOS revision level must assume that all errata documented for that PBA and BIOS revision level are present ...

18

73761101 pdf

73761101 pdf

... The VC820 board offers an AC ’97 V 1.03 compliant audio feature-set supported by the Creative Labs ES1373 digital controller with Crystal Semiconductor CS4297 (A) codec (see Figure 4 below). AC ’97 uses a five-wire ...

122

Lorentz-Zygmund Spaces and Interpolation of Weak Type Operators

Lorentz-Zygmund Spaces and Interpolation of Weak Type Operators

... 13.. The proof that h is decreasing is similar.. The proof is now complete.. This completes the proof.. This completes the proof of Theorem A. The following theorem[r] ...

96

Download
			
			
				Download PDF

Download Download PDF

... of proof on public bodies that access to and further processing of such data is necessary (rather than merely useful), as well as strict procedural requirements for obtaining such access in the form of warrants or ...

6

Disintegrating Tamper Mass   US Patent 4628819 pdf

Disintegrating Tamper Mass US Patent 4628819 pdf

... The tamper mass is formed to replace the steel plates 20 and 22 of ...of tamper material having a density of three gm/cc ...overall tamper density is determined by the binder and the particles ...the ...

11

Tamper  Resilient  Circuits:  The  Adversary  at  the  Gates

Tamper Resilient Circuits: The Adversary at the Gates

... of tamper resilient gates among the known constructions that are shown to be resilient against wire- tampering ...a tamper resilience impossibility result that applies to both gate and wire tampering ...

27

A Survey on Reversible Watermarking Techniques for Image Security

A Survey on Reversible Watermarking Techniques for Image Security

... (4) Tamper Localisation ...identify tamper locations in ...new tamper based technique based on the discussion and analysis provided in this ...

11

A tamper-proof audit and control system for the doctor in the loop

A tamper-proof audit and control system for the doctor in the loop

... While the concept of the ‘‘doctor in the loop’’ seems to be a logical consequence of the application of machine learning technologies and derived knowledge into medical science, one majo[r] ...

11

Show all 5512 documents...

Related subjects