Public key encryption resilient to leakage and tampering attacks (Q2402358): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simultaneous Hardcore Bits and Cryptography against Memory Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Resilient to Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434895 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography Secure against Related-Key Attacks and Tampering / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On cryptography with auxiliary input / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Encryption in the Bounded-Retrieval Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Public-Key Cryptography in the Presence of Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Leakage-Resilient Identity-Based Encryption with CCA Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Encryption Resilient to Continual Auxiliary Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4797801 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364574 / rank
 
Normal rank
Property / cites work
 
Property / cites work: RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier / rank
 
Normal rank
Property / cites work
 
Property / cites work: Continuous Non-malleable Key Derivation and Its Application to Related-Key Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tamper Detection and Continuous Non-malleable Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography with Tamperable and Leaky Memory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circular-Secure Encryption from Decision Diffie-Hellman / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Continuous Non-malleable Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Non-malleable Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tamper and Leakage Resilience in the Split-State Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Encryption Schemes with Auxiliary Inputs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737235 / rank
 
Normal rank

Latest revision as of 09:29, 14 July 2024

scientific article
Language Label Description Also known as
English
Public key encryption resilient to leakage and tampering attacks
scientific article

    Statements

    Public key encryption resilient to leakage and tampering attacks (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    7 September 2017
    0 references
    0 references
    public key encryption
    0 references
    hash proof system
    0 references
    chosen-ciphertext security
    0 references
    key-leakage attack
    0 references
    tampering attack
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references