{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:37:02Z","timestamp":1760708222481},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642150302"},{"type":"electronic","value":"9783642150319"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15031-9_26","type":"book-chapter","created":{"date-parts":[[2010,8,7]],"date-time":"2010-08-07T15:34:35Z","timestamp":1281195275000},"page":"383-397","source":"Crossref","is-referenced-by-count":22,"title":["Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs"],"prefix":"10.1007","author":[{"given":"Kimmo","family":"J\u00e4rvinen","sequence":"first","affiliation":[]},{"given":"Vladimir","family":"Kolesnikov","sequence":"additional","affiliation":[]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/3-540-44709-1_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"M.-L. Akkar","year":"2001","unstructured":"Akkar, M.-L., Giraud, C.: An implementation of DES and AES, secure against some attacks. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 309\u2013318. Springer, Heidelberg (2001)"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 13\u201328. Springer, Heidelberg (2003)"},{"key":"26_CR3","first-page":"169","volume-title":"STOC\u201909","author":"C. Gentry","year":"2009","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC\u201909, pp. 169\u2013178. ACM, New York (2009)"},{"key":"26_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/978-3-540-85174-5_3","volume-title":"Advances in Cryptology \u2013 CRYPTO 2008","author":"S. Goldwasser","year":"2008","unstructured":"Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: One-time programs. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.\u00a05157, pp. 39\u201356. Springer, Heidelberg (2008)"},{"key":"26_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1007\/978-3-642-11799-2_19","volume-title":"TCC\u201910","author":"V. Goyal","year":"2010","unstructured":"Goyal, V., Ishai, Y., Sahai, A., Venkatesan, R., Wadia, A.: Founding cryptography on tamper-proof hardware tokens. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol.\u00a05978, pp. 308\u2013326. Springer, Heidelberg (2010)"},{"key":"26_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-540-85230-8_8","volume-title":"Financial Cryptography and Data Security","author":"V. Gunupudi","year":"2008","unstructured":"Gunupudi, V., Tate, S.: Generalized non-interactive oblivious transfer using count-limited objects with applications to secure mobile agents. In: Tsudik, G. (ed.) FC 2008. LNCS, vol.\u00a05143, pp. 98\u2013112. Springer, Heidelberg (2008)"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"J\u00e4rvinen, K., Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Garbled circuits for leakage-resilience: Hardware implementation and evaluation of one-time programs. Cryptology ePrint Archive, Report 2010\/276(2010), http:\/\/eprint.iacr.org","DOI":"10.1007\/978-3-642-15031-9_26"},{"key":"26_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/978-3-642-14577-3_17","volume-title":"FC\u201910","author":"K. J\u00e4rvinen","year":"2010","unstructured":"J\u00e4rvinen, K., Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Embedded SFE: Offloading server and network using hardware tokens. In: Sion, R. (ed.) FC 2010. LNCS, vol.\u00a06052, pp. 207\u2013221. Springer, Heidelberg (2010)"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"26_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/978-3-540-70583-3_40","volume-title":"Automata, Languages and Programming","author":"V. Kolesnikov","year":"2008","unstructured":"Kolesnikov, V., Schneider, T.: Improved garbled circuit: Free XOR gates and applications. In: Aceto, L., Damg\u00e5rd, I., Goldberg, L.A., Halld\u00f3rsson, M.M., Ing\u00f3lfsd\u00f3ttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol.\u00a05126, pp. 486\u2013498. Springer, Heidelberg (2008)"},{"key":"26_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-540-85230-8_7","volume-title":"Financial Cryptography and Data Security","author":"V. Kolesnikov","year":"2008","unstructured":"Kolesnikov, V., Schneider, T.: A practical universal circuit construction and secure evaluation of private functions. In: Tsudik, G. (ed.) FC 2008. LNCS, vol.\u00a05143, pp. 83\u201397. Springer, Heidelberg (2008)"},{"issue":"2","key":"26_CR12","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s00145-008-9036-8","volume":"22","author":"Y. Lindell","year":"2009","unstructured":"Lindell, Y., Pinkas, B.: A proof of Yao\u2019s protocol for secure two-party computation. Journal of Cryptology\u00a022(2), 161\u2013188 (2009)","journal-title":"Journal of Cryptology"},{"key":"26_CR13","unstructured":"Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay \u2014 a secure two-party computation system. In: USENIX Security\u201904. USENIX Association (2004)"},{"key":"26_CR14","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"S. Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)"},{"key":"26_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/3-540-44499-8_19","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"T.S. Messerges","year":"2000","unstructured":"Messerges, T.S.: Using second-order power analysis to attack DPA resistant software. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 238\u2013251. Springer, Heidelberg (2000)"},{"key":"26_CR16","unstructured":"Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: SODA\u201901, pp. 448\u2013457. Society for Industrial and Applied Mathematics (2001)"},{"key":"26_CR17","unstructured":"Pietrzak, K.: Provable security for physical cryptography. In: WEWORC\u201909 (2009), http:\/\/homepages.cwi.nl\/~pietrzak\/publications\/Pie09b.pdf"},{"key":"26_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1007\/978-3-642-10366-7_15","volume-title":"ASIACRYPT\u201909","author":"B. Pinkas","year":"2009","unstructured":"Pinkas, B., Schneider, T., Smart, N.P., Williams, S.C.: Secure two-party computation is practical. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol.\u00a05912, pp. 250\u2013267. Springer, Heidelberg (2009)"},{"key":"26_CR19","series-title":"Lecture Notes in Computer Science","first-page":"336","volume-title":"ICISC\u201908","author":"A.-R. Sadeghi","year":"2008","unstructured":"Sadeghi, A.-R., Schneider, T.: Generalized universal circuits for secure evaluation of private functions with application to data classification. In: ICISC 2008. LNCS, vol.\u00a05461, pp. 336\u2013353. Springer, Heidelberg (2008)"},{"key":"26_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-540-85053-3_7","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"A. Satoh","year":"2008","unstructured":"Satoh, A., Sugawara, T., Homma, N., Aoki, T.: High-performance concurrent error detection scheme for AES hardware. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 100\u2013112. Springer, Heidelberg (2008)"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Standaert, F.-X., Pereira, O., Yu, Y., Quisquater, J.-J., Yung, M., Oswald, E.: Leakage resilient cryptography in practice. Cryptology ePrint Archive, Report 2009\/341 (2009), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-642-14452-3_5"},{"key":"26_CR22","unstructured":"STMicroelectronics. Smartcard MCU with 32-bit ARM SecurCore SC300 CPU and 1.25 Mbytes high-density Flash memory. Data brief (October 2008), http:\/\/www.st.com\/stonline\/products\/literature\/bd\/15066\/st33f1m.pdf"},{"key":"26_CR23","first-page":"15","volume-title":"DAC\u201907","author":"K. Tiri","year":"2007","unstructured":"Tiri, K.: Side-channel attack pitfalls. In: DAC\u201907, pp. 15\u201320. ACM, New York (2007)"},{"key":"26_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/11545262_26","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"K. Tiri","year":"2005","unstructured":"Tiri, K., Hwang, D., Hodjat, A., Lai, B.-C., Yang, S., Schaumont, P., Verbauwhede, I.: Prototype IC with WDDL and differential routing \u2014 DPA resistance assessment. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 354\u2013365. Springer, Heidelberg (2005)"},{"key":"26_CR25","first-page":"246","volume-title":"DATE\u201904","author":"K. Tiri","year":"2004","unstructured":"Tiri, K., Verbauwhede, I.: A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation. In: DATE\u201904, vol.\u00a01, pp. 246\u2013251. IEEE, Los Alamitos (2004)"},{"key":"26_CR26","unstructured":"Trusted Computing\u00a0Group (TCG). TPM main specification. Technical report, TCG (May 2009), http:\/\/www.trustedcomputinggroup.org"},{"key":"26_CR27","first-page":"196","volume-title":"STOC\u201976","author":"L.G. Valiant","year":"1976","unstructured":"Valiant, L.G.: Universal circuits (preliminary report). In: STOC\u201976, pp. 196\u2013203. ACM, New York (1976)"},{"key":"26_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/3-540-44499-8_24","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"S.H. Weingart","year":"2000","unstructured":"Weingart, S.H.: Physical security devices for computer subsystems: A survey of attacks and defences. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 302\u2013317. Springer, Heidelberg (2000)"},{"key":"26_CR29","first-page":"162","volume-title":"FOCS\u201986","author":"A.C. Yao","year":"1986","unstructured":"Yao, A.C.: How to generate and exchange secrets. In: FOCS\u201986, pp. 162\u2013167. IEEE, Los Alamitos (1986)"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems, CHES 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15031-9_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,4]],"date-time":"2021-11-04T01:27:06Z","timestamp":1635989226000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15031-9_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642150302","9783642150319"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15031-9_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}