Papers:
- An Inspection-Resistant On-chip Memory Architecture
Melissa Chase, Andrew Putnam, Tim Sherwood, Dan Shumow and V. Vaikuntanathan
Under Submission
- Cryptography against continual Memory Leakage
Z. Brakerski, Y. Kalai, J. Katz and V. Vaikuntanathan
FOCS 2010 (to appear).
Cryptology Eprint Archive.
- Protecting against Computationally Bounded and Noisy Leakage
S. Faust, T. Rabin, L. Reyzin, E. Tromer and V. Vaikuntanathan
Eurocrypt 2010 (to appear). [pdf]
- Public-key Encryption Schemes with Auxiliary Inputs
Y. Dodis, S. Goldwasser, Y. Kalai, C. Peikert and V. Vaikuntanathan
Theory of Cryptography Conference (TCC) 2010. [pdf]
- Robustness of the Learning with Errors Assumption
S. Goldwasser, Y. Kalai, C. Peikert and V. Vaikuntanathan
Innovations in Computer Science (ICS) 2010. [pdf]
- Signature Schemes with Bounded Leakage Resilience
J. Katz and V. Vaikuntanathan
Asiacrypt 2009. [pdf]
- Cryptography against Memory Attacks
A. Akavia, S. Goldwasser and V. Vaikuntanathan
Theory of Cryptography Conference (TCC) 2009. [pdf]