Bounded-Retrieval Model with Keys Derived from Private Data
From MaRDI portal
Publication:2980861
DOI10.1007/978-3-319-54705-3_17zbMath1404.94064MaRDI QIDQ2980861
Tomasz Kazana, Konrad Durnoga, Maciej Zdanowicz, Stefan Dziembowski, Michał Zając
Publication date: 5 May 2017
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-54705-3_17
94A60: Cryptography
Cites Work
- Unnamed Item
- Constructing locally computable extractors and cryptosystems in the bounded-storage model
- Randomness is linear in space
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Public-Key Encryption in the Bounded-Retrieval Model
- Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
- A Pseudorandom Generator from any One-way Function
- Overcoming Weak Expectations
- Bounds for Dispersers, Extractors, and Depth-Two Superconcentrators
- Leftover Hash Lemma, Revisited
- Advances in Cryptology - EUROCRYPT 2004
- Theory of Cryptography
- Theory of Cryptography