Leakage-resilient cryptography from puncturable primitives and obfuscation (Q1710617): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
Removed claim: author (P16): Item:Q270257
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / author
 
Property / author: Yu Yu Wang / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-03329-3_20 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2886037732 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Encryption in the Bounded-Retrieval Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simultaneous Hardcore Bits and Cryptography against Memory Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Tolerant Interactive Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the (im)possibility of obfuscating programs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Signatures and Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Parallel Repetition Theorem for Leakage Resilience / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364574 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Leakage-Resilient Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Negative Results on Differing-Inputs Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constrained Pseudorandom Functions and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Regularly lossy functions and applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737235 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-resilient cryptography from puncturable primitives and obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Publicly Evaluable Pseudorandom Functions and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Encryption Schemes with Auxiliary Inputs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Public-Key Encryption from Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Public-Key Cryptography in the Presence of Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: On cryptography with auxiliary input / rank
 
Normal rank
Property / cites work
 
Property / cites work: Overcoming Weak Expectations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3729902 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Zero Knowledge / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: After-the-Fact Leakage in Public-Key Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Cryptography from Minimal Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short and Stateless Signatures from the RSA Assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Coin Differing-Inputs Obfuscation and Its Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptive Trapdoor Functions and Chosen-Ciphertext Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage Resilient One-Way Functions: The Auxiliary-Input Setting / rank
 
Normal rank
Property / cites work
 
Property / cites work: Signature Schemes with Bounded Leakage Resilience / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to leak on key updates / rank
 
Normal rank
Property / cites work
 
Property / cites work: Achieving Leakage Resilience through Dual System Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Signatures Resilient to Continual Leakage on Memory and Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Resilient to Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Leakage-Resilient Mode of Operation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lossy trapdoor functions and their applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chosen-Ciphertext Security via Correlated Products / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to use indistinguishability obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Chosen-Ciphertext Security via Extractable Hash Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Barriers in cryptography with weak, correlated and leaky sources / rank
 
Normal rank
Property / cites work
 
Property / cites work: Signatures Resilient to Uninvertible Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Encryption Resilient to Continual Auxiliary Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Updatable Hash Proof System and Its Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Magic of ELFs / rank
 
Normal rank

Latest revision as of 22:50, 17 July 2024

scientific article
Language Label Description Also known as
English
Leakage-resilient cryptography from puncturable primitives and obfuscation
scientific article

    Statements

    Leakage-resilient cryptography from puncturable primitives and obfuscation (English)
    0 references
    0 references
    0 references
    0 references
    23 January 2019
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers