Pages that link to "Item:Q5895111"
From MaRDI portal
The following pages link to Public-Key Cryptosystems Resilient to Key Leakage (Q5895111):
Displayed 50 items.
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- Leakage-resilient cryptography from minimal assumptions (Q315546) (← links)
- Bounded tamper resilience: how to go beyond the algebraic barrier (Q514469) (← links)
- An algebraic framework for Diffie-Hellman assumptions (Q514473) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Better security for deterministic public-key encryption: the auxiliary-input setting (Q744600) (← links)
- Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks (Q893862) (← links)
- Efficient and secure big data storage system with leakage resilience in cloud computing (Q1626278) (← links)
- Regular lossy functions and their applications in leakage-resilient cryptography (Q1643156) (← links)
- Another step towards realizing random oracles: non-malleable point obfuscation (Q1648795) (← links)
- On the leakage-resilient key exchange (Q1684049) (← links)
- Provably secure certificate-based encryption with leakage resilience (Q1698724) (← links)
- Leakage-resilient cryptography from puncturable primitives and obfuscation (Q1710617) (← links)
- Unifying leakage models: from probing attacks to noisy leakage (Q1715856) (← links)
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings (Q1752551) (← links)
- Group homomorphic encryption: characterizations, impossibility results, and applications (Q1943979) (← links)
- More constructions of lossy and correlation-secure trapdoor functions (Q1946593) (← links)
- New approach to practical leakage-resilient public-key cryptography (Q2023806) (← links)
- Novel generic construction of leakage-resilient PKE scheme with CCA security (Q2035456) (← links)
- Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks (Q2061928) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- Leakage-resilient key exchange and two-seed extractors (Q2096493) (← links)
- Targeted lossy functions and applications (Q2139643) (← links)
- Leakage-resilient coin tossing (Q2251154) (← links)
- Post-challenge leakage in public-key encryption (Q2257289) (← links)
- Continuous leakage-resilient certificate-based encryption (Q2279532) (← links)
- Novel updatable identity-based hash proof system and its applications (Q2283028) (← links)
- Identity-based encryption with leakage-amplified chosen-ciphertext attacks security (Q2290636) (← links)
- Leakage-resilient biometric-based remote user authentication with fuzzy extractors (Q2304568) (← links)
- Leakage resilience from program obfuscation (Q2318088) (← links)
- The magic of ELFs (Q2318089) (← links)
- Continuous leakage-resilient identity-based encryption with leakage amplification (Q2324786) (← links)
- Structure-preserving public-key encryption with leakage-resilient CCA security (Q2330095) (← links)
- Fully leakage-resilient signatures (Q2392093) (← links)
- Naor-Yung paradigm with shared randomness and applications (Q2401764) (← links)
- Public key encryption resilient to leakage and tampering attacks (Q2402358) (← links)
- Strong authenticated key exchange with auxiliary inputs (Q2402976) (← links)
- Anonymous and leakage resilient IBE and IPE (Q2407713) (← links)
- The generic construction of continuous leakage-resilient identity-based cryptosystems (Q2632014) (← links)
- Public-key encryption scheme with optimal continuous leakage resilience (Q2680220) (← links)
- Circular security is complete for KDM security (Q2692344) (← links)
- Updatable public key encryption in the standard model (Q2697895) (← links)
- Verifiable Random Functions from Standard Assumptions (Q2796131) (← links)
- Multilinear Maps from Obfuscation (Q2796137) (← links)
- Optimal Amplification of Noisy Leakages (Q2799099) (← links)
- Deterministic Public-Key Encryption Under Continual Leakage (Q2822678) (← links)
- Naor-Yung Paradigm with Shared Randomness and Applications (Q2827710) (← links)
- Signatures Resilient to Uninvertible Leakage (Q2827729) (← links)
- Leakage Resilience of the Blom’s Key Distribution Scheme (Q2948266) (← links)
- Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage (Q2953868) (← links)