Leakage resilient one-way functions: the auxiliary-input setting
From MaRDI portal
Publication:1784737
DOI10.1016/j.tcs.2018.06.014zbMath1408.94942OpenAlexW2807738323WikidataQ129696145 ScholiaQ129696145MaRDI QIDQ1784737
Publication date: 27 September 2018
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2018.06.014
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On strong simulation and composable point obfuscation
- Fully leakage-resilient signatures
- The Magic of ELFs
- Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation
- Using Indistinguishability Obfuscation via UCEs
- Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Lossy Trapdoor Functions and Their Applications
- Leakage-Resilient Signatures
- Public-Key Encryption Schemes with Auxiliary Inputs
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
- Leakage-Resilient Storage
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- A Leakage-Resilient Mode of Operation
- Signature Schemes with Bounded Leakage Resilience
- Survey: Leakage Resilience and the Bounded Retrieval Model
- On cryptography with auxiliary input
- Protecting Circuits from Computationally Bounded and Noisy Leakage
- Multiparty computation secure against continual memory leakage
- Advances in Cryptology - CRYPTO 2003
- Obfuscating Point Functions with Multibit Output
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
This page was built for publication: Leakage resilient one-way functions: the auxiliary-input setting