Now showing items 1-1 of 1
-
Near Optimal Non-malleable Codes and Leakage Resilient Secret Sharing Schemes
Sekar, SruthiA well-studied class of attacks on cryptosystems called "side-channel attacks", stems from the additional access that an adversary can get due to the susceptibility of the hardware on which the cryptosystem (e.g., digital ...