Circuits resilient to additive attacks with applications to secure computation.
Daniel GenkinYuval IshaiManoj PrabhakaranAmit SahaiEran TromerPublished in: STOC (2014)
Keyphrases
- security mechanisms
- stream cipher
- cryptographic protocols
- security flaws
- security protocols
- secure routing
- chosen plaintext
- high speed
- security measures
- block cipher
- key management
- security issues
- countermeasures
- remote user authentication scheme
- computer security
- digital watermarking
- security threats
- delay insensitive
- information leakage
- resource constrained
- access control