Non-malleable codes
We introduce the notion of “non-malleable codes” which relaxes the notion of error
correction and error detection. Informally, a code is non-malleable if the message contained …
correction and error detection. Informally, a code is non-malleable if the message contained …
Non-malleable codes from additive combinatorics
Non-malleable codes provide a useful and meaningful security guarantee in situations
where traditional errorcorrection (and even error-detection) is impossible; for example, when …
where traditional errorcorrection (and even error-detection) is impossible; for example, when …
Non-malleable codes from two-source extractors
We construct an efficient information-theoretically non-malleable code in the split-state
model for one-bit messages. Non-malleable codes were introduced recently by …
model for one-bit messages. Non-malleable codes were introduced recently by …
Protecting circuits from leakage: the computationally-bounded and noisy cases
Physical computational devices leak side-channel information that may, and often does,
reveal secret internal states. We present a general transformation that compiles any circuit …
reveal secret internal states. We present a general transformation that compiles any circuit …
Continuous non-malleable codes
Non-malleable codes are a natural relaxation of error correcting/detecting codes that have
useful applications in the context of tamper resilient cryptography. Informally, a code is non …
useful applications in the context of tamper resilient cryptography. Informally, a code is non …
On the local leakage resilience of linear secret sharing schemes
We consider the following basic question: to what extent are standard secret sharing
schemes and protocols for secure multiparty computation that build on them resilient to …
schemes and protocols for secure multiparty computation that build on them resilient to …
A survey of leakage-resilient cryptography
In the past 15 years, cryptography has made considerable progress in expanding the
adversarial attack model to cover side-channel attacks and has built schemes to provably …
adversarial attack model to cover side-channel attacks and has built schemes to provably …
Efficient non-malleable codes and key derivation for poly-size tampering circuits
Non-malleable codes, defined by Dziembowski, Pietrzak, and Wichs (ICS'10), provide
roughly the following guarantee: if a codeword c encoding some message x is tampered to …
roughly the following guarantee: if a codeword c encoding some message x is tampered to …
Tamper detection and continuous non-malleable codes
Z Jafargholi, D Wichs - Theory of Cryptography Conference, 2015 - Springer
WeN consider a public and keyless code (Enc, Dec) which is used to encode a message m
and derive a codeword c= Enc (m). The codeword can be adversarially tampered via a …
and derive a codeword c= Enc (m). The codeword can be adversarially tampered via a …
New bounds on the local leakage resilience of shamir's secret sharing scheme
We study the local leakage resilience of Shamir's secret sharing scheme. In Shamir's
scheme, a random polynomial f of degree t is sampled over a field of size p> n, conditioned …
scheme, a random polynomial f of degree t is sampled over a field of size p> n, conditioned …