Back to Results
First PageMeta Content
Electronic commerce / Cryptographic protocols / RSA / Cipher / Zero-knowledge proof / PP / Cryptography / Public-key cryptography / Homomorphic encryption


Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions Nico D¨ottling, Thilo Mie, J¨orn M¨ uller-Quade, and Tobias Nilges Karlsruhe Institute of Technology, Karlsruhe, Germany
Add to Reading List

Document Date: 2012-01-16 05:13:26


Open Document

File Size: 397,37 KB

Share Result on Facebook

Facility

Tobias Nilges Karlsruhe Institute of Technology / /

IndustryTerm

leaky hardware / machinery / stateful tamper-proof hardware / malicious stateful hardware / stateless tamperproof hardware / argument-systems / software-protection / stateless hardware / cloud-computing applications / cryptographic protocols / stateless tamper-proof hardware device / digital rights management / stateful hardware / cloud-computing / argument systems / even secure cloud computing / desired protocol / access control systems / /

Organization

PPT V / Institute of Technology / /

Position

IND-CPA / standard IND-CPA / /

ProgrammingLanguage

J / D / /

Technology

encryption / cryptography / second protocol / secret key / third protocol / public key / four algorithms / Evaluate algorithms / Dec algorithms / /

SocialTag