On the leakage-resilient key exchange (Q1684049): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1515/jmc-2016-0003 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2769755916 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2724434 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Verifiable Random Functions from Identity-Based Key Encapsulation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simultaneous Hardcore Bits and Cryptography against Memory Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Continuous After-the-Fact Leakage-Resilient Key Exchange / rank
 
Normal rank
Property / cites work
 
Property / cites work: Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2743964 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341751 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4234051 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778861 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737235 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Cryptography from the Inner-Product Extractor / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: After-the-Fact Leakage in Public-Key Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3191615 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Signature Schemes with Bounded Leakage Resilience / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Randomness Extraction Paradigm for Hybrid Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Stronger Security of Authenticated Key Exchange / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2724455 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Signatures Resilient to Continual Leakage on Memory and Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Examining smart-card security under the threat of power analysis attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Resilient to Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Leakage-Resilient Mode of Operation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient eCK-Secure Authenticated Key Exchange Protocols in the Standard Model / rank
 
Normal rank

Latest revision as of 19:23, 14 July 2024

scientific article
Language Label Description Also known as
English
On the leakage-resilient key exchange
scientific article

    Statements

    On the leakage-resilient key exchange (English)
    0 references
    0 references
    4 December 2017
    0 references
    key exchange protocols
    0 references
    security models
    0 references
    leakage-resilient cryptography
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references