The following pages link to Leakage-Resilient Storage (Q3588335):
Displayed 28 items.
- Incompressible functions, relative-error extractors, and the power of nondeterministic reductions (Q301524) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Leakage resilient one-way functions: the auxiliary-input setting (Q1784737) (← links)
- The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free (Q2056741) (← links)
- Adaptive extractors and their application to leakage resilient secret sharing (Q2129011) (← links)
- Practical continuously non-malleable randomness encoders in the random oracle model (Q2149829) (← links)
- ZK-PCPs from leakage-resilient secret sharing (Q2159466) (← links)
- Continuously non-malleable secret sharing for general access structures (Q2175937) (← links)
- Strong continuous non-malleable encoding schemes with tamper-detection (Q2195381) (← links)
- Continuously non-malleable codes in the split-state model (Q2210446) (← links)
- Post-challenge leakage in public-key encryption (Q2257289) (← links)
- Naor-Yung paradigm with shared randomness and applications (Q2401764) (← links)
- Efficient Leakage Resilient Circuit Compilers (Q2790050) (← links)
- Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice (Q2794525) (← links)
- Optimal Amplification of Noisy Leakages (Q2799099) (← links)
- Naor-Yung Paradigm with Shared Randomness and Applications (Q2827710) (← links)
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting (Q3179355) (← links)
- Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation (Q3448807) (← links)
- How to Compute in the Presence of Leakage (Q3449567) (← links)
- Non-Malleable Codes from Additive Combinatorics (Q4637777) (← links)
- On the Connection between Leakage Tolerance and Adaptive Security (Q4916027) (← links)
- Fully Leakage-Resilient Codes (Q5738793) (← links)
- Continuously non-malleable codes with split-state refresh (Q5915916) (← links)
- On the local leakage resilience of linear secret sharing schemes (Q5918308) (← links)
- Short leakage resilient and non-malleable secret sharing schemes (Q6097261) (← links)
- Extractors: low entropy requirements colliding with non-malleability (Q6145926) (← links)
- Explicit non-malleable codes from bipartite graphs (Q6169015) (← links)
- New bounds on the local leakage resilience of Shamir's secret sharing scheme (Q6186590) (← links)