Funder
Canadian Network for Research and Innovation in Machining Technology, Natural Sciences and Engineering Research Council of Canada
Division of Computer and Network Systems
Division of Computing and Communication Foundations
Alfred P. Sloan Foundation
Microsoft New Faculty Fellowship
AFOSR YIP
Defense Advanced Research Projects Agency
Air Force Research Laboratory
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,General Computer Science
Reference43 articles.
1. Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings, volume 5444 of Lecture Notes in Computer Science, pp. 474–495. Springer, Berlin (2009)
2. Anderson, R., Kuhn, M.: Tamper resistance—a cautionary note. In: Proceedings of the Second USENIX Workshop on Electronic Commerce, pp. 1–11, November (1996)
3. One, A.: Smashing the stack for fun and profit. Phrack Magazine, 7(49):File 14 (1996)
4. Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: EUROCRYPT: Advances in Cryptology: Proceedings of EUROCRYPT (1997)
5. Brakerski, Z., Kalai, Y. T., Katz, J., Vaikuntanathan, V.: Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage. In: FOCS, pp. 501–510. IEEE Computer Society (2010)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献