International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

How to Compute under ${\cal{AC}}^{\sf0}$ Leakage without Secure Hardware

Authors:
Guy N. Rothblum
Download:
DOI: 10.1007/978-3-642-32009-5_32 (login may be required)
URL: https://www.iacr.org/archive/crypto2012/74170547/74170547.pdf
Search ePrint
Search Google
Presentation: Slides
Conference: CRYPTO 2012
BibTeX
@inproceedings{crypto-2012-24332,
  title={How to Compute under ${\cal{AC}}^{\sf0}$ Leakage without Secure Hardware},
  booktitle={Advances in Cryptology - Crypto 2012},
  series={Lecture Notes in Computer Science},
  publisher={Springer},
  volume={7417},
  pages={552-569},
  url={https://www.iacr.org/archive/crypto2012/74170547/74170547.pdf},
  doi={10.1007/978-3-642-32009-5_32},
  author={Guy N. Rothblum},
  year=2012
}