Fully leakage-resilient signatures (Q2392093): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Simultaneous Hardcore Bits and Cryptography against Memory Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Encryption in the Bounded-Retrieval Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Universal Arguments and their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3210163 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364574 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bonsai Trees, or How to Delegate a Lattice Basis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Encryption Schemes with Auxiliary Inputs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Public-Key Cryptography in the Presence of Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Storing Secrets on Continually Leaky Devices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: On cryptography with auxiliary input / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases / rank
 
Normal rank
Property / cites work
 
Property / cites work: How To Prove Yourself: Practical Solutions to Identification and Signature Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: More Constructions of Lossy and Correlation-Secure Trapdoor Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Zero Knowledge / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Perfect Non-interactive Zero Knowledge for NP / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Non-interactive Proof Systems for Bilinear Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reconstructing RSA Private Keys from Random Key Bits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short and Stateless Signatures from the RSA Assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protecting Cryptographic Keys against Continual Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Signature Schemes with Bounded Leakage Resilience / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography and Game Theory: Designing Protocols for Exchanging Information / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to leak on key updates / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptographic Primitives Provably as Secure as Subset Sum / rank
 
Normal rank
Property / cites work
 
Property / cites work: Signatures Resilient to Continual Leakage on Memory and Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computationally Sound Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Resilient to Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Framework for Efficient and Composable Oblivious Transfer / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lossy Trapdoor Functions and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Leakage-Resilient Mode of Operation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography with Tamperable and Leaky Memory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Identity-Based Encryption Without Random Oracles / rank
 
Normal rank

Latest revision as of 16:28, 6 July 2024

scientific article
Language Label Description Also known as
English
Fully leakage-resilient signatures
scientific article

    Statements

    Fully leakage-resilient signatures (English)
    0 references
    0 references
    0 references
    0 references
    1 August 2013
    0 references
    leakage-resilient cryptography
    0 references
    signature schemes
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers