[PDF] Top 20 Non-malleable Codes against Lookahead Tampering
Has 10000 "Non-malleable Codes against Lookahead Tampering" found on our website. Below are the top 20 most common "Non-malleable Codes against Lookahead Tampering".
Non-malleable Codes against Lookahead Tampering
... of non-malleable codes for message integrity for scenarios where error-correction or, even, error-detection is ...of non-malleable codes are tamper resilient storage and ... See full document
33
Explicit Non-Malleable Codes Resistant to Permutations
... that non-malleable codes can be useful in obtaining tamper-proof security as ...of tampering-function f ∈ F ...a non-malleable code secure against the class F, then the ... See full document
48
Tamper Detection and Continuous Non-Malleable Codes
... Non-malleable codes offer strong protection against ...a non- malleable code for F, we ensure that an attacker cannot learn anything more by tampering with the data on the ... See full document
24
Non-Malleable Codes with Split-State Refresh
... Two different ways to circumvent the fail-or-not attack has been proposed in the literature. In [33] Liu and Lysyanskaya propose that the strengthened device whenever it reconstructed the key K = Decode(X) resamples a ... See full document
42
Privacy Amplification from Non-malleable Codes
... “seeded Non-malleable extractors (NME)”, which has the property that the output of the extractor looks uniform, even given its value on a related ...a non-interactive one-time message authentication ... See full document
37
Non-Malleable Codes for Small-Depth Circuits
... the non-standard definition is appropriate in some settings, we argue that the standard definition is the right one in the context of non-malleable ...error-correcting codes in the literature ... See full document
26
Inception Makes Non-malleable Codes Stronger
... of two distinct messages, if they do not decode to ⊥ or the original messages, respectively, then the two tampered codewords are indistinguishable. This re- quired a careful re-analysis of the various cases in [ADL14], ... See full document
26
Block-wise Non-Malleable Codes
... of non-malleable commitments was initiated by Dolev, Dwork, and Naor ...n-round non-malleable commitment assuming the existence of one-way function and no trusted set ...showed ... See full document
51
Leakage-resilient non-malleable codes
... protection against tampering ...is non-malleable with respect to the set of manipulation functions that the adversary is able to induce by ...protection against such ...of ... See full document
26
Explicit Non-malleable Codes Resistant to Permutations and Perturbations
... Example 2. Now consider a tampering function f which creates each inner codeword by accumulating bits from every inner codeword of the input code. In this case, we would like to use the fact that each bit in the ... See full document
53
Textbook Non-Malleable Commitments
... with non-negligible ...with non-negligible ...resulting tampering functions will have L ...conditionally non-malleable. Extension to non-synchronizing ...security against ... See full document
36
Non-Malleable Codes for Partial Functions with Manipulation Detection
... Security against memory tampering - (Logarithmic length alphabets, no ...the tampering function tampers with each state independently, and thus the states need to be physically ... See full document
30
Non-Malleable Secret Sharing
... detection(AMD) codes and gave almost optimal constructions for them. These codes allow the adversary to “blindly” add any value to the codeword, and ensure that any such algebraic tampering will be ... See full document
45
Non-malleable Reductions and Applications
... 2-split-state tampering to the so called family of “lookahead functions”, which is a natural model for “one-pass” ...resulting non-malleable codes that we get using this reduction could ... See full document
34
From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes
... on non-malleable codes yields a solution to the problem of domain extension for SD-CCA-secure PKE, provided that the underlying code is continuously non-malleable against a ... See full document
37
Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions
... In order to save on leakage queries, we simulate the answers to the adver- sary’s tampering queries by using an optimistic approach, essentially returning the value that had more chances to be encoded by the ... See full document
30
Continuously Non-Malleable Codes with Split-State Refresh
... split-state tampering attempts, without requiring a self-destruct capability, and in a model where re- freshing of the memory happens only after an invalid output is ... See full document
52
Information-theoretic Local Non-malleable Codes and their Applications
... correcting codes provide no guarantees for larger classes of tam- pering ...of non-malleable codes. Informally, non-malleable codes are codes such that for all ... See full document
26
Optimal Computational Split-state Non-malleable Codes
... (AMD) codes, which is a special case of non-malleable codes against tamper- ing functions with a simple algebraic structure; explicit AMD codes with op- timal (second order) ... See full document
25
Locally Decodable and Updatable Non-Malleable Codes and Their Applications
... of non-malleable codes was defined by Dziembowski, Pietrzak and Wichs [23] as a relaxation of error-correcting ...is non-malleable against a tampering function if by ... See full document
32
Related subjects