Pages that link to "Item:Q3650722"
From MaRDI portal
The following pages link to Signature Schemes with Bounded Leakage Resilience (Q3650722):
Displaying 50 items.
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- Leakage-resilient cryptography from minimal assumptions (Q315546) (← links)
- Security of message authentication codes in the presence of key-dependent messages (Q420612) (← links)
- Bounded tamper resilience: how to go beyond the algebraic barrier (Q514469) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Black-box constructions of signature schemes in the bounded leakage setting (Q781055) (← links)
- Identity-based broadcast encryption with continuous leakage resilience (Q781856) (← links)
- Regular lossy functions and their applications in leakage-resilient cryptography (Q1643156) (← links)
- On the leakage-resilient key exchange (Q1684049) (← links)
- Leakage-resilient cryptography from puncturable primitives and obfuscation (Q1710617) (← links)
- Leakage-resilient ring signature schemes (Q1711836) (← links)
- On the tightness of forward-secure signature reductions (Q1715854) (← links)
- Unifying leakage models: from probing attacks to noisy leakage (Q1715856) (← links)
- Leakage resilient one-way functions: the auxiliary-input setting (Q1784737) (← links)
- Leakage-resilient group signature: definitions and constructions (Q1999051) (← links)
- New approach to practical leakage-resilient public-key cryptography (Q2023806) (← links)
- (In)security of ring-LWE under partial key exposure (Q2027270) (← links)
- Towards a ring analogue of the leftover hash lemma (Q2027271) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- Hierarchical attribute based encryption with continuous leakage-resilience (Q2213099) (← links)
- Leakage-resilient coin tossing (Q2251154) (← links)
- Leakage resilience from program obfuscation (Q2318088) (← links)
- Fully leakage-resilient signatures (Q2392093) (← links)
- Naor-Yung paradigm with shared randomness and applications (Q2401764) (← links)
- Strong authenticated key exchange with auxiliary inputs (Q2402976) (← links)
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks (Q2403460) (← links)
- The generic construction of continuous leakage-resilient identity-based cryptosystems (Q2632014) (← links)
- Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy (Q2697881) (← links)
- Naor-Yung Paradigm with Shared Randomness and Applications (Q2827710) (← links)
- Signatures Resilient to Uninvertible Leakage (Q2827729) (← links)
- Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More (Q2890012) (← links)
- Crypto Galore! (Q2908530) (← links)
- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy (Q2947523) (← links)
- Leakage Resilience of the Blom’s Key Distribution Scheme (Q2948266) (← links)
- A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model (Q2953870) (← links)
- Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience (Q2958151) (← links)
- Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience (Q3012821) (← links)
- Leakage Resilient Strong Key-Insulated Signatures in Public Channel (Q3103599) (← links)
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting (Q3179355) (← links)
- On Symmetric Encryption and Point Obfuscation (Q3408187) (← links)
- Obfuscation of Hyperplane Membership (Q3408188) (← links)
- Leakage-Resilient Signatures (Q3408204) (← links)
- Public-Key Encryption Schemes with Auxiliary Inputs (Q3408205) (← links)
- Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation (Q3448807) (← links)
- A Practical Leakage-Resilient Signature Scheme in the Generic Group Model (Q3455486) (← links)
- Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange (Q3460112) (← links)
- Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage (Q3460114) (← links)
- A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting (Q4605650) (← links)
- On the Connection between Leakage Tolerance and Adaptive Security (Q4916027) (← links)
- A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes (Q4931664) (← links)