The following pages link to Theory of Cryptography (Q5901777):
Displaying 44 items.
- Optimal Amplification of Noisy Leakages (Q2799099) (← links)
- Deterministic Public-Key Encryption Under Continual Leakage (Q2822678) (← links)
- On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages (Q2946470) (← links)
- Near Collision Attack on the Grain v1 Stream Cipher (Q2946894) (← links)
- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy (Q2947523) (← links)
- Leakage Resilience of the Blom’s Key Distribution Scheme (Q2948266) (← links)
- A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model (Q2953870) (← links)
- Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF (Q2958140) (← links)
- Leakage-Resilient Coin Tossing (Q3095326) (← links)
- Certified Security Proofs of Cryptographic Protocols in the Computational Model: An Application to Intrusion Resilience (Q3100218) (← links)
- Leakage Resilient Strong Key-Insulated Signatures in Public Channel (Q3103599) (← links)
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting (Q3179355) (← links)
- On Symmetric Encryption and Point Obfuscation (Q3408187) (← links)
- Leakage-Resilient Signatures (Q3408204) (← links)
- Public-Key Encryption Schemes with Auxiliary Inputs (Q3408205) (← links)
- How to Compute in the Presence of Leakage (Q3449567) (← links)
- Fully Homomorphic Encryption with Auxiliary Inputs (Q3454587) (← links)
- A Leakage Resilient MAC (Q3460113) (← links)
- Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage (Q3460114) (← links)
- An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security (Q3503880) (← links)
- Private Circuits II: Keeping Secrets in Tamperable Circuits (Q3593103) (← links)
- Language Modeling and Encryption on Packet Switched Networks (Q3593106) (← links)
- One-Time Programs (Q3600212) (← links)
- Cryptography without (Hardly Any) Secrets ? (Q3627445) (← links)
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (Q3627450) (← links)
- A Leakage-Resilient Mode of Operation (Q3627451) (← links)
- A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting (Q4605650) (← links)
- Interleaved Group Products (Q4634030) (← links)
- On the Connection between Leakage Tolerance and Adaptive Security (Q4916027) (← links)
- Witness Maps and Applications (Q5041158) (← links)
- Memory leakage-resilient secret sharing schemes (Q5046490) (← links)
- The Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise Appearance (Q5188548) (← links)
- Fully Leakage-Resilient Codes (Q5738793) (← links)
- Unconditionally secure computation against low-complexity leakage (Q5918097) (← links)
- Constructing tree decompositions of graphs with bounded gonality (Q5918255) (← links)
- On the local leakage resilience of linear secret sharing schemes (Q5918308) (← links)
- Correction to: ``Unconditionally secure computation against low-complexity leakage'' (Q5925544) (← links)
- Short leakage resilient and non-malleable secret sharing schemes (Q6097261) (← links)
- A modular approach to the incompressibility of block-cipher-based AEADs (Q6132427) (← links)
- Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model (Q6145951) (← links)
- Efficient leakage-resilient MACs without idealized assumptions (Q6157513) (← links)
- Instantiability of classical random-oracle-model encryption transforms (Q6175981) (← links)
- New bounds on the local leakage resilience of Shamir's secret sharing scheme (Q6186590) (← links)
- Unifying freedom and separation for tight probing-secure composition (Q6186765) (← links)