The following pages link to Theory of Cryptography (Q5901777):
Displayed 50 items.
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- Leakage-resilient cryptography from minimal assumptions (Q315546) (← links)
- Security of message authentication codes in the presence of key-dependent messages (Q420612) (← links)
- Secure computation without computers (Q517015) (← links)
- On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives (Q726335) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Black-box constructions of signature schemes in the bounded leakage setting (Q781055) (← links)
- Horizontal collision correlation attack on elliptic curves (Q892284) (← links)
- Constructive and destructive use of compilers in elliptic curve cryptography (Q1015356) (← links)
- On the leakage-resilient key exchange (Q1684049) (← links)
- On the impossibility of cryptography with tamperable randomness (Q1688399) (← links)
- Provably secure certificate-based encryption with leakage resilience (Q1698724) (← links)
- Leakage-resilient cryptography from puncturable primitives and obfuscation (Q1710617) (← links)
- Leakage-resilient ring signature schemes (Q1711836) (← links)
- Unifying leakage models: from probing attacks to noisy leakage (Q1715856) (← links)
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings (Q1752551) (← links)
- Leakage resilient one-way functions: the auxiliary-input setting (Q1784737) (← links)
- Leakage-resilient group signature: definitions and constructions (Q1999051) (← links)
- Classical leakage resilience from fault-tolerant quantum computation (Q2010581) (← links)
- New approach to practical leakage-resilient public-key cryptography (Q2023806) (← links)
- The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free (Q2056741) (← links)
- Random probing security: verification, composition, expansion and new constructions (Q2096491) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- Leakage-resilient key exchange and two-seed extractors (Q2096493) (← links)
- Reverse firewalls for actively secure MPCs (Q2096547) (← links)
- Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions (Q2106709) (← links)
- Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version (Q2120989) (← links)
- \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption (Q2146096) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- A novel completeness test for leakage models and its application to side channel attacks and responsibly engineered simulators (Q2170091) (← links)
- Key-policy attribute-based encryption against continual auxiliary input leakage (Q2200658) (← links)
- Hierarchical attribute based encryption with continuous leakage-resilience (Q2213099) (← links)
- Leakage-resilient coin tossing (Q2251154) (← links)
- Post-challenge leakage in public-key encryption (Q2257289) (← links)
- Continuous leakage-resilient certificate-based encryption (Q2279532) (← links)
- Locally decodable and updatable non-malleable codes and their applications (Q2303459) (← links)
- Leakage-resilient biometric-based remote user authentication with fuzzy extractors (Q2304568) (← links)
- Leakage resilience from program obfuscation (Q2318088) (← links)
- Strongly leakage resilient authenticated key exchange, revisited (Q2334443) (← links)
- Fully leakage-resilient signatures (Q2392093) (← links)
- Public key encryption resilient to leakage and tampering attacks (Q2402358) (← links)
- Strong authenticated key exchange with auxiliary inputs (Q2402976) (← links)
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks (Q2403460) (← links)
- Anonymous and leakage resilient IBE and IPE (Q2407713) (← links)
- System-level non-interference of constant-time cryptography. I: Model (Q2417947) (← links)
- Threshold public key encryption scheme resilient against continual leakage without random oracles (Q2418660) (← links)
- Limits of a conjecture on a leakage-resilient cryptosystem (Q2445905) (← links)
- A unified approach to deterministic encryption: new constructions and a connection to computational entropy (Q2516532) (← links)
- Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks (Q2794524) (← links)
- Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice (Q2794525) (← links)