Non-malleable codes

S Dziembowski, K Pietrzak, D Wichs - Journal of the ACM (JACM), 2018 - dl.acm.org
We introduce the notion of “non-malleable codes” which relaxes the notion of error
correction and error detection. Informally, a code is non-malleable if the message contained …

Non-malleable codes from additive combinatorics

D Aggarwal, Y Dodis, S Lovett - Proceedings of the forty-sixth annual …, 2014 - dl.acm.org
Non-malleable codes provide a useful and meaningful security guarantee in situations
where traditional errorcorrection (and even error-detection) is impossible; for example, when …

Non-malleable codes from two-source extractors

S Dziembowski, T Kazana, M Obremski - Annual Cryptology Conference, 2013 - Springer
We construct an efficient information-theoretically non-malleable code in the split-state
model for one-bit messages. Non-malleable codes were introduced recently by …

Protecting circuits from leakage: the computationally-bounded and noisy cases

S Faust, T Rabin, L Reyzin, E Tromer… - Advances in Cryptology …, 2010 - Springer
Physical computational devices leak side-channel information that may, and often does,
reveal secret internal states. We present a general transformation that compiles any circuit …

Continuous non-malleable codes

S Faust, P Mukherjee, JB Nielsen, D Venturi - Theory of Cryptography …, 2014 - Springer
Non-malleable codes are a natural relaxation of error correcting/detecting codes that have
useful applications in the context of tamper resilient cryptography. Informally, a code is non …

On the local leakage resilience of linear secret sharing schemes

F Benhamouda, A Degwekar, Y Ishai, T Rabin - Journal of Cryptology, 2021 - Springer
We consider the following basic question: to what extent are standard secret sharing
schemes and protocols for secure multiparty computation that build on them resilient to …

A survey of leakage-resilient cryptography

YT Kalai, L Reyzin - Providing Sound Foundations for Cryptography: On …, 2019 - dl.acm.org
In the past 15 years, cryptography has made considerable progress in expanding the
adversarial attack model to cover side-channel attacks and has built schemes to provably …

Efficient non-malleable codes and key derivation for poly-size tampering circuits

S Faust, P Mukherjee, D Venturi… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Non-malleable codes, defined by Dziembowski, Pietrzak, and Wichs (ICS'10), provide
roughly the following guarantee: if a codeword c encoding some message x is tampered to …

Tamper detection and continuous non-malleable codes

Z Jafargholi, D Wichs - Theory of Cryptography Conference, 2015 - Springer
WeN consider a public and keyless code (Enc, Dec) which is used to encode a message m
and derive a codeword c= Enc (m). The codeword can be adversarially tampered via a …

New bounds on the local leakage resilience of shamir's secret sharing scheme

O Klein, I Komargodski - Annual International Cryptology Conference, 2023 - Springer
We study the local leakage resilience of Shamir's secret sharing scheme. In Shamir's
scheme, a random polynomial f of degree t is sampled over a field of size p> n, conditioned …