Adaptive extractors and their application to leakage resilient secret sharing (Q2129011): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-84252-9_20 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3165271206 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Amplifying Privacy in Privacy Amplification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-malleable Reductions and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-malleable codes from additive combinatorics / rank
 
Normal rank
Property / cites work
 
Property / cites work: Revisiting non-malleable secret sharing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3202940 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the local leakage resilience of linear secret sharing schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-malleable secret sharing against bounded joint-tampering attacks in the plain model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Continuously non-malleable secret sharing for general access structures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Storage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-malleable secret sharing in the computational setting: adaptive tampering, noisy-leakage resilience, and improved rate / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-malleable secret sharing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unbalanced expanders and randomness extractors from Parvaresh--Vardy codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Repairing Reed-solomon codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tamper and Leakage Resilience in the Split-State Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Randomness is linear in space / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Compute under $${\mathcal {\varvec{AC}}}^\mathbf{0}$$ Leakage without Secure Hardware / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage resilient secret sharing and applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Exposure-resilient extractors and the derandomization of probabilistic sublinear time / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 17:50, 28 July 2024

scientific article
Language Label Description Also known as
English
Adaptive extractors and their application to leakage resilient secret sharing
scientific article

    Statements

    Adaptive extractors and their application to leakage resilient secret sharing (English)
    0 references
    0 references
    0 references
    0 references
    22 April 2022
    0 references
    randomness extractors
    0 references
    leakage resilient secret sharing
    0 references
    information theoretic cryptography
    0 references
    0 references
    0 references

    Identifiers