共 23 条
- [1] Dachman-Soled D(2012)Securing circuits against constant-rate tampering IACR Cryptol. ePrint Arch. 2012 366-402
- [2] Kalai YT(2011)Tamper-proof circuits: how to trade leakage for tamper-resilience ICALP 1 391-299
- [3] Faust S(1984)Probabilistic encryption J. Comput. Syst. Sci. 28 270-32
- [4] Pietrzak K(1994)Definitions and properties of zero-knowledge proof systems J. Cryptol. 7 1-1549
- [5] Venturi D(2015)How to compute in the presence of leakage SIAM J. Comput. 44 1480-1396
- [6] Goldwasser S(1999)A pseudorandom generator from any one-way function SIAM J. Comput. 28 1364-27
- [7] Micali S(2004)Beyond stack smashing: recent advances in exploiting buffer overruns IEEE Secur. Priv. 2 20-126
- [8] Goldreich O(1978)A method for obtaining digital signatures and public-key cryptosystems Commun. ACM 21 120-87
- [9] Oren Y(1994)Subliminal channels; past and present ETT 5 15-undefined
- [10] Goldwasser S(1986)Generating quasi-random sequences from semi-random sources J. Comput. Syst. Sci. 33 75-undefined