Information Theoretic Security

@inproceedings{Lehmann2015InformationTS,
  title={Information Theoretic Security},
  author={Anja Lehmann and Stefan Wolf},
  booktitle={Lecture Notes in Computer Science},
  year={2015}
}
We present the notion of continuous non-malleable codes along with an instantiation and we show how to use them to securely compute any keyed cryptographic primitive on a computational architecture with a single constant size untamperable CPU and a tamperable and leaky memory in which both the secret key and the program of the cryptographic primitive is located. 

Citations

Publications citing this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 29 REFERENCES

Similar Papers

Loading similar papers…