Bounded tamper resilience: how to go beyond the algebraic barrier (Q514469): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: Non-malleable Reductions and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-malleable codes from additive combinatorics / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Non-malleable Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Continual Leakage of Discrete Log Representations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography Secure against Related-Key Attacks and Tampering / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434895 / rank
 
Normal rank
Property / cites work
 
Property / cites work: RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Message Authentication Against Related-Key Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the importance of eliminating errors in cryptographic computations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circular-Secure Encryption from Decision Diffie-Hellman / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Capacity of non-malleable codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-malleable coding against bit-wise and split-state tampering / rank
 
Normal rank
Property / cites work
 
Property / cites work: BiTR: Built-in Tamper Resilience / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-Malleable Encryption: Simpler, Shorter, Stronger / rank
 
Normal rank
Property / cites work
 
Property / cites work: From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4394211 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Securing Circuits against Constant-Rate Tampering / rank
 
Normal rank
Property / cites work
 
Property / cites work: Securing Circuits and Protocols against 1/poly(k) Tampering Rate / rank
 
Normal rank
Property / cites work
 
Property / cites work: Locally Decodable and Updatable Non-malleable Codes and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Chaining Lemma and Its Application / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Public-Key Cryptography in the Presence of Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-malleable Codes from Two-Source Extractors / rank
 
Normal rank
Property / cites work
 
Property / cites work: One-Time Computable Self-erasing Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-Malleable Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Non-malleability of the Fiat-Shamir Transform / rank
 
Normal rank
Property / cites work
 
Property / cites work: Continuous Non-malleable Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Tamper and Leakage Resilient von Neumann Architecture / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience / rank
 
Normal rank
Property / cites work
 
Property / cites work: How To Prove Yourself: Practical Solutions to Identification and Signature Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4472068 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circuits resilient to additive attacks with applications to secure computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Correlated-Input Secure Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3495643 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Private Circuits II: Keeping Secrets in Tamperable Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tamper Detection and Continuous Non-malleable Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography with Tamperable and Leaky Memory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Signature Schemes with Bounded Leakage Resilience / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tamper Resilient Circuits: The Adversary at the Gates / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tamper and Leakage Resilience in the Split-State Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Resilient to Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4318686 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Continuous Non-malleable Key Derivation and Its Application to Related-Key Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Encryption against Related Key Attacks / rank
 
Normal rank

Revision as of 11:45, 13 July 2024

scientific article
Language Label Description Also known as
English
Bounded tamper resilience: how to go beyond the algebraic barrier
scientific article

    Statements

    Bounded tamper resilience: how to go beyond the algebraic barrier (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    2 March 2017
    0 references
    related key security
    0 references
    bounded tamper resilience
    0 references
    public key encryption
    0 references
    identification schemes
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers