Pages that link to "Item:Q3000534"
From MaRDI portal
The following pages link to Signatures Resilient to Continual Leakage on Memory and Computation (Q3000534):
Displaying 34 items.
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives (Q726335) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Black-box constructions of signature schemes in the bounded leakage setting (Q781055) (← links)
- Linearly homomorphic structure-preserving signatures and their applications (Q887427) (← links)
- On the leakage-resilient key exchange (Q1684049) (← links)
- Provably secure certificate-based encryption with leakage resilience (Q1698724) (← links)
- Leakage-resilient cryptography from puncturable primitives and obfuscation (Q1710617) (← links)
- Leakage-resilient ring signature schemes (Q1711836) (← links)
- New approach to practical leakage-resilient public-key cryptography (Q2023806) (← links)
- (In)security of ring-LWE under partial key exposure (Q2027270) (← links)
- Towards a ring analogue of the leftover hash lemma (Q2027271) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions (Q2210433) (← links)
- Continuous leakage-resilient certificate-based encryption (Q2279532) (← links)
- Leakage resilience from program obfuscation (Q2318088) (← links)
- Fully leakage-resilient signatures (Q2392093) (← links)
- Non-interactive composition of sigma-protocols via Share-then-Hash (Q2691604) (← links)
- Leakage-Resilient Functional Encryption via Pair Encodings (Q2817484) (← links)
- Signatures Resilient to Uninvertible Leakage (Q2827729) (← links)
- Short Attribute-Based Signatures for Threshold Predicates (Q2889994) (← links)
- A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model (Q2953870) (← links)
- Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency (Q3194598) (← links)
- Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation (Q3448807) (← links)
- A Practical Leakage-Resilient Signature Scheme in the Generic Group Model (Q3455486) (← links)
- Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting (Q3457062) (← links)
- Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange (Q3460112) (← links)
- A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting (Q4605650) (← links)
- Witness Maps and Applications (Q5041158) (← links)
- On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation Soundness (Q5041170) (← links)
- Memory leakage-resilient secret sharing schemes (Q5046490) (← links)
- Predictable Arguments of Knowledge (Q5738785) (← links)
- Fully Leakage-Resilient Codes (Q5738793) (← links)