Pages that link to "Item:Q3183555"
From MaRDI portal
The following pages link to Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model (Q3183555):
Displayed 50 items.
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- Leakage-resilient cryptography from minimal assumptions (Q315546) (← links)
- Bounded tamper resilience: how to go beyond the algebraic barrier (Q514469) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Efficient and secure big data storage system with leakage resilience in cloud computing (Q1626278) (← links)
- Provable time-memory trade-offs: symmetric cryptography against memory-bounded adversaries (Q1629393) (← links)
- Regular lossy functions and their applications in leakage-resilient cryptography (Q1643156) (← links)
- Provably secure certificate-based encryption with leakage resilience (Q1698724) (← links)
- Quasi chain rule for min-entropy (Q1707982) (← links)
- Leakage-resilient cryptography from puncturable primitives and obfuscation (Q1710617) (← links)
- Leakage-resilient ring signature schemes (Q1711836) (← links)
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings (Q1752551) (← links)
- Leakage resilient one-way functions: the auxiliary-input setting (Q1784737) (← links)
- Subversion-resilient signatures: definitions, constructions and applications (Q1989360) (← links)
- Leakage-resilient group signature: definitions and constructions (Q1999051) (← links)
- New approach to practical leakage-resilient public-key cryptography (Q2023806) (← links)
- Novel generic construction of leakage-resilient PKE scheme with CCA security (Q2035456) (← links)
- Leakage-resilient key exchange and two-seed extractors (Q2096493) (← links)
- Incompressible encodings (Q2096497) (← links)
- Targeted lossy functions and applications (Q2139643) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- Incompressible cryptography (Q2170026) (← links)
- Hierarchical attribute based encryption with continuous leakage-resilience (Q2213099) (← links)
- Post-challenge leakage in public-key encryption (Q2257289) (← links)
- Continuous leakage-resilient certificate-based encryption (Q2279532) (← links)
- Novel updatable identity-based hash proof system and its applications (Q2283028) (← links)
- Continuous leakage-resilient identity-based encryption with leakage amplification (Q2324786) (← links)
- Strongly leakage resilient authenticated key exchange, revisited (Q2334443) (← links)
- Fully leakage-resilient signatures (Q2392093) (← links)
- Naor-Yung paradigm with shared randomness and applications (Q2401764) (← links)
- ABE with improved auxiliary input for big data security (Q2402348) (← links)
- Strong authenticated key exchange with auxiliary inputs (Q2402976) (← links)
- Threshold public key encryption scheme resilient against continual leakage without random oracles (Q2418660) (← links)
- Optimal Amplification of Noisy Leakages (Q2799099) (← links)
- Naor-Yung Paradigm with Shared Randomness and Applications (Q2827710) (← links)
- Big-Key Symmetric Encryption: Resisting Key Exfiltration (Q2835594) (← links)
- Crypto Galore! (Q2908530) (← links)
- Leakage Resilience of the Blom’s Key Distribution Scheme (Q2948266) (← links)
- Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage (Q2953868) (← links)
- Bounded-Retrieval Model with Keys Derived from Private Data (Q2980861) (← links)
- Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation (Q2980862) (← links)
- Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience (Q3012821) (← links)
- Expedient Non-malleability Notions for Hash Functions (Q3073712) (← links)
- Randomness Leakage in the KEM/DEM Framework (Q3092368) (← links)
- Leakage Resilient Strong Key-Insulated Signatures in Public Channel (Q3103599) (← links)
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting (Q3179355) (← links)
- Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption (Q3194601) (← links)
- On Symmetric Encryption and Point Obfuscation (Q3408187) (← links)
- Leakage-Resilient Signatures (Q3408204) (← links)
- Public-Key Encryption Schemes with Auxiliary Inputs (Q3408205) (← links)