Tamper and leakage resilient von Neumann architectures from continuous non-malleable codes

Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

We present the notion of continuous non-malleable codes along with an instantiation and we show how to use them to securely compute any keyed cryptographic primitive on a computational architecture with a single constant size untamperable CPU and a tamperable and leaky memory in which both the secret key and the program of the cryptographic primitive is located.

Original languageEnglish
Title of host publication8th International Conference on Information Theoretic Security, ICITS 2015
EditorsS. Wolf , A. Lehmann
Number of pages2
Volume9063
PublisherSpringer
Publication year2015
PagesXI-XII
ISBN (print)978-331917469-3
Publication statusPublished - 2015
Event8th International Conference on Information Theoretic Security, ICITS 2015 - Lugano, Switzerland
Duration: 2 May 20155 May 2015

Conference

Conference8th International Conference on Information Theoretic Security, ICITS 2015
LandSwitzerland
ByLugano
Periode02/05/201505/05/2015
SponsorNCCR Quantum Science and Technology, Universita della Svizzera italiana
SeriesLecture Notes in Computer Science
ISSN0302-9743

See relations at Aarhus University Citationformats

ID: 98039211