The following pages link to Theory of Cryptography (Q5898356):
Displayed 25 items.
- Leakage-resilient cryptography from minimal assumptions (Q315546) (← links)
- Bounded tamper resilience: how to go beyond the algebraic barrier (Q514469) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Static-memory-hard functions, and modeling the cost of space vs. time (Q1629397) (← links)
- The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free (Q2056741) (← links)
- Incompressible encodings (Q2096497) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- Incompressible cryptography (Q2170026) (← links)
- Big-Key Symmetric Encryption: Resisting Key Exfiltration (Q2835594) (← links)
- Crypto Galore! (Q2908530) (← links)
- Leakage Resilience of the Blom’s Key Distribution Scheme (Q2948266) (← links)
- Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness (Q2958117) (← links)
- Efficient and Provable White-Box Primitives (Q2958118) (← links)
- Bounded-Retrieval Model with Keys Derived from Private Data (Q2980861) (← links)
- Certified Security Proofs of Cryptographic Protocols in the Computational Model: An Application to Intrusion Resilience (Q3100218) (← links)
- Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation (Q3448807) (← links)
- One-Time Programs with Limited Memory (Q3454868) (← links)
- Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage (Q3460114) (← links)
- A Leakage-Resilient Mode of Operation (Q3627451) (← links)
- A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes (Q4931664) (← links)
- Universally composable secure positioning in the bounded retrieval model (Q5046481) (← links)
- On differential privacy and adaptive data analysis with bounded space (Q6085262) (← links)
- IBE with incompressible master secret and small identity secrets (Q6114253) (← links)
- Rate-1 incompressible encryption from standard assumptions (Q6114264) (← links)
- A modular approach to the incompressibility of block-cipher-based AEADs (Q6132427) (← links)