We study the question of protecting arithmetic circuits against additive attacks, which can add an arbitrary fixed value to each wire in the circuit. This extends the notion of algebraic manipulation detection (AMD) codes, which protect information against additive attacks, to that of AMD circuits which protect computation. We present a construction of such AMD circuits: any arithmetic circuit C over a finite field F can be converted into a functionally-equivalent randomized arithmetic circuit C ̂ of size O(|C|) that is fault-tolerant in the following sense. For any additive attack on the wires of Ĉ, its effect on the output of C ̂ can be simulated, up to O(|C|/|F|) statistical distance, by an additive attack on just the input and output. ...
Cryptographic hardware has found many uses in many ubiquitous and pervasive security devices with a ...
Security against hardware trojans is currently becoming an essential ingredient to ensure trust in i...
Algebraic manipulation detection (AMD) codes, introduced at EUROCRYPT 2008, may, in some sense, be v...
Thesis (M.Sc.Eng.) PLEASE NOTE: Boston University Libraries did not receive an Authorization To Mana...
Physical computational devices leak side-channel information that may, and often does, reveal secret...
Abstract—Modern security-aware embedded systems need pro-tection against fault attacks. These attack...
We present a compiler that converts any circuit into one that remains secure even if a constant frac...
Algebraic Manipulation Detection (AMD) codes form a cryptographic primitive designed to detect data ...
We consider the task of secure multi-party computation of arithmetic circuits over a finite field. U...
Abstract. Motivated by the problem of protecting cryptographic hard-ware, we continue the investigat...
Algebraic immunity (AI) is a property of a Boolean function f that measures its sus-ceptibility to a...
At CRYPTO 2018, Cascudo et al. introduced Reverse Multiplication Friendly Embeddings (RMFEs). These ...
Abstract. Can you guarantee secrecy even if an adversary can eavesdrop on your brain? We consider th...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
We study the complexity of securely evaluating an arithmetic circuit over a finite field $F$ in the ...
Cryptographic hardware has found many uses in many ubiquitous and pervasive security devices with a ...
Security against hardware trojans is currently becoming an essential ingredient to ensure trust in i...
Algebraic manipulation detection (AMD) codes, introduced at EUROCRYPT 2008, may, in some sense, be v...
Thesis (M.Sc.Eng.) PLEASE NOTE: Boston University Libraries did not receive an Authorization To Mana...
Physical computational devices leak side-channel information that may, and often does, reveal secret...
Abstract—Modern security-aware embedded systems need pro-tection against fault attacks. These attack...
We present a compiler that converts any circuit into one that remains secure even if a constant frac...
Algebraic Manipulation Detection (AMD) codes form a cryptographic primitive designed to detect data ...
We consider the task of secure multi-party computation of arithmetic circuits over a finite field. U...
Abstract. Motivated by the problem of protecting cryptographic hard-ware, we continue the investigat...
Algebraic immunity (AI) is a property of a Boolean function f that measures its sus-ceptibility to a...
At CRYPTO 2018, Cascudo et al. introduced Reverse Multiplication Friendly Embeddings (RMFEs). These ...
Abstract. Can you guarantee secrecy even if an adversary can eavesdrop on your brain? We consider th...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
We study the complexity of securely evaluating an arithmetic circuit over a finite field $F$ in the ...
Cryptographic hardware has found many uses in many ubiquitous and pervasive security devices with a ...
Security against hardware trojans is currently becoming an essential ingredient to ensure trust in i...
Algebraic manipulation detection (AMD) codes, introduced at EUROCRYPT 2008, may, in some sense, be v...