Deterministic Public-Key Encryption Under Continual Leakage (Q2822678): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-319-39555-5_17 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2499140796 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simultaneous Hardcore Bits and Cryptography against Memory Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Encryption in the Bounded-Retrieval Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Interactive Proofs under Continual Memory Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4387320 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deterministic and Efficiently Searchable Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based (Lossy) Trapdoor Functions and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiparty computation secure against continual memory leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Leakage-Resilient Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Public-Key Cryptography in the Presence of Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: On cryptography with auxiliary input / rank
 
Normal rank
Property / cites work
 
Property / cites work: Correcting errors without leaking partial information / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases / rank
 
Normal rank
Property / cites work
 
Property / cites work: More Constructions of Lossy and Correlation-Secure Trapdoor Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Zero Knowledge / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Cryptography from Minimal Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: All-But-Many Lossy Trapdoor Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to leak on key updates / rank
 
Normal rank
Property / cites work
 
Property / cites work: Achieving Leakage Resilience through Dual System Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Incremental Deterministic Public-Key Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Resilient to Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2006 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Achieving Constant Round Leakage-Resilient Zero-Knowledge / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lossy trapdoor functions and their applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4788557 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual Projective Hashing and Its Applications — Lossy Trapdoor Functions and More / rank
 
Normal rank

Latest revision as of 15:18, 12 July 2024

scientific article
Language Label Description Also known as
English
Deterministic Public-Key Encryption Under Continual Leakage
scientific article

    Statements

    Deterministic Public-Key Encryption Under Continual Leakage (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    4 October 2016
    0 references
    deterministic public key encryption
    0 references
    leakage resilient cryptography
    0 references
    lossy trapdoor functions
    0 references
    0 references
    0 references
    0 references

    Identifiers