On the Connection between Leakage Tolerance and Adaptive Security (Q4916027): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-642-36362-7_30 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2109781171 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Universal Arguments and their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4318711 / rank
 
Normal rank
Property / cites work
 
Property / cites work: From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Tolerant Interactive Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4228521 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Storage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Public-Key Cryptography in the Presence of Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: On cryptography with auxiliary input / rank
 
Normal rank
Property / cites work
 
Property / cites work: Storing Secrets on Continually Leaky Devices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Cryptography from the Inner-Product Extractor / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Circuits without Computational Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases / rank
 
Normal rank
Property / cites work
 
Property / cites work: How To Prove Yourself: Practical Solutions to Identification and Signature Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Zero Knowledge / rank
 
Normal rank
Property / cites work
 
Property / cites work: Separating succinct non-interactive arguments from all falsifiable assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: After-the-Fact Leakage in Public-Key Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Seed-Incompressible Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Parallel Repetition for Leakage Resilience Amplification Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Signature Schemes with Bounded Leakage Resilience / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computationally Sound Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Resilient to Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409113 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Leakage-Resilient Mode of Operation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Parallel repetition of computationally sound protocols revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4788557 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Proofs of Knowledge / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automata, Languages and Programming / rank
 
Normal rank

Latest revision as of 09:44, 6 July 2024

scientific article; zbMATH DE number 6155842
Language Label Description Also known as
English
On the Connection between Leakage Tolerance and Adaptive Security
scientific article; zbMATH DE number 6155842

    Statements

    On the Connection between Leakage Tolerance and Adaptive Security (English)
    0 references
    0 references
    0 references
    0 references
    19 April 2013
    0 references
    simulation-based security
    0 references
    leakage tolerance
    0 references
    adaptive security
    0 references
    arguments of knowledge
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers