• No results found

[PDF] Top 20 Non-malleable Codes against Lookahead Tampering

Has 10000 "Non-malleable Codes against Lookahead Tampering" found on our website. Below are the top 20 most common "Non-malleable Codes against Lookahead Tampering".

Non-malleable  Codes  against  Lookahead  Tampering

Non-malleable Codes against Lookahead Tampering

... of non-malleable codes for message integrity for scenarios where error-correction or, even, error-detection is ...of non-malleable codes are tamper resilient storage and ... See full document

33

Explicit  Non-Malleable  Codes  Resistant  to  Permutations

Explicit Non-Malleable Codes Resistant to Permutations

... that non-malleable codes can be useful in obtaining tamper-proof security as ...of tampering-function f ∈ F ...a non-malleable code secure against the class F, then the ... See full document

48

Tamper  Detection   and  Continuous  Non-Malleable  Codes

Tamper Detection and Continuous Non-Malleable Codes

... Non-malleable codes offer strong protection against ...a non- malleable code for F, we ensure that an attacker cannot learn anything more by tampering with the data on the ... See full document

24

Non-Malleable  Codes  with  Split-State  Refresh

Non-Malleable Codes with Split-State Refresh

... Two different ways to circumvent the fail-or-not attack has been proposed in the literature. In [33] Liu and Lysyanskaya propose that the strengthened device whenever it reconstructed the key K = Decode(X) resamples a ... See full document

42

Privacy  Amplification  from  Non-malleable  Codes

Privacy Amplification from Non-malleable Codes

... “seeded Non-malleable extractors (NME)”, which has the property that the output of the extractor looks uniform, even given its value on a related ...a non-interactive one-time message authentication ... See full document

37

Non-Malleable  Codes  for  Small-Depth  Circuits

Non-Malleable Codes for Small-Depth Circuits

... the non-standard definition is appropriate in some settings, we argue that the standard definition is the right one in the context of non-malleable ...error-correcting codes in the literature ... See full document

26

Inception  Makes  Non-malleable  Codes  Stronger

Inception Makes Non-malleable Codes Stronger

... of two distinct messages, if they do not decode to ⊥ or the original messages, respectively, then the two tampered codewords are indistinguishable. This re- quired a careful re-analysis of the various cases in [ADL14], ... See full document

26

Block-wise  Non-Malleable  Codes

Block-wise Non-Malleable Codes

... of non-malleable commitments was initiated by Dolev, Dwork, and Naor ...n-round non-malleable commitment assuming the existence of one-way function and no trusted set ...showed ... See full document

51

Leakage-resilient  non-malleable  codes

Leakage-resilient non-malleable codes

... protection against tampering ...is non-malleable with respect to the set of manipulation functions that the adversary is able to induce by ...protection against such ...of ... See full document

26

Explicit  Non-malleable  Codes  Resistant  to  Permutations   and  Perturbations

Explicit Non-malleable Codes Resistant to Permutations and Perturbations

... Example 2. Now consider a tampering function f which creates each inner codeword by accumulating bits from every inner codeword of the input code. In this case, we would like to use the fact that each bit in the ... See full document

53

Textbook  Non-Malleable  Commitments

Textbook Non-Malleable Commitments

... with non-negligible ...with non-negligible ...resulting tampering functions will have L ...conditionally non-malleable. Extension to non-synchronizing ...security against ... See full document

36

Non-Malleable  Codes  for  Partial  Functions  with  Manipulation  Detection

Non-Malleable Codes for Partial Functions with Manipulation Detection

... Security against memory tampering - (Logarithmic length alphabets, no ...the tampering function tampers with each state independently, and thus the states need to be physically ... See full document

30

Non-Malleable  Secret  Sharing

Non-Malleable Secret Sharing

... detection(AMD) codes and gave almost optimal constructions for them. These codes allow the adversary to “blindly” add any value to the codeword, and ensure that any such algebraic tampering will be ... See full document

45

Non-malleable  Reductions   and  Applications

Non-malleable Reductions and Applications

... 2-split-state tampering to the so called family of “lookahead functions”, which is a natural model for “one-pass” ...resulting non-malleable codes that we get using this reduction could ... See full document

34

From  Single-Bit  to  Multi-Bit  Public-Key  Encryption  via  Non-Malleable  Codes

From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes

... on non-malleable codes yields a solution to the problem of domain extension for SD-CCA-secure PKE, provided that the underlying code is continuously non-malleable against a ... See full document

37

Continuously  Non-Malleable  Codes  in  the  Split-State  Model  from  Minimal  Assumptions

Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions

... In order to save on leakage queries, we simulate the answers to the adver- sary’s tampering queries by using an optimistic approach, essentially returning the value that had more chances to be encoded by the ... See full document

30

Continuously  Non-Malleable  Codes  with  Split-State  Refresh

Continuously Non-Malleable Codes with Split-State Refresh

... split-state tampering attempts, without requiring a self-destruct capability, and in a model where re- freshing of the memory happens only after an invalid output is ... See full document

52

Information-theoretic  Local  Non-malleable  Codes   and  their  Applications

Information-theoretic Local Non-malleable Codes and their Applications

... correcting codes provide no guarantees for larger classes of tam- pering ...of non-malleable codes. Informally, non-malleable codes are codes such that for all ... See full document

26

Optimal  Computational  Split-state  Non-malleable  Codes

Optimal Computational Split-state Non-malleable Codes

... (AMD) codes, which is a special case of non-malleable codes against tamper- ing functions with a simple algebraic structure; explicit AMD codes with op- timal (second order) ... See full document

25

Locally  Decodable   and  Updatable  Non-Malleable  Codes   and  Their  Applications

Locally Decodable and Updatable Non-Malleable Codes and Their Applications

... of non-malleable codes was defined by Dziembowski, Pietrzak and Wichs [23] as a relaxation of error-correcting ...is non-malleable against a tampering function if by ... See full document

32

Show all 10000 documents...