Leakage resilient one-way functions: the auxiliary-input setting
From MaRDI portal
Publication:1784737
DOI10.1016/J.TCS.2018.06.014zbMATH Open1408.94942OpenAlexW2807738323WikidataQ129696145 ScholiaQ129696145MaRDI QIDQ1784737FDOQ1784737
Authors: Ilan Komargodski
Publication date: 27 September 2018
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2018.06.014
Recommendations
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- Unprovability of leakage-resilient cryptography beyond the information-theoretic limit
- Leakage-resilient cryptography from minimal assumptions
- Leakage-resilient cryptography from minimal assumptions
- Signature schemes secure against hard-to-invert leakage
Cites Work
- Efficient public-key cryptography in the presence of key leakage
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Public-key cryptosystems resilient to key leakage
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-resilient signatures
- Public-key encryption schemes with auxiliary inputs
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- A Leakage-Resilient Mode of Operation
- Signature schemes with bounded leakage resilience
- Survey: leakage resilience and the bounded retrieval model
- On cryptography with auxiliary input
- Theory of Cryptography
- Leakage-resilient storage
- Protecting circuits from computationally bounded and noisy leakage
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Advances in Cryptology - CRYPTO 2003
- Title not available (Why is that?)
- Obfuscating Point Functions with Multibit Output
- Fully leakage-resilient signatures
- Exposure-resilient functions and all-or-nothing transforms
- Multiparty computation secure against continual memory leakage
- Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input
- Lossy Trapdoor Functions and Their Applications
- On strong simulation and composable point obfuscation
- Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks
- The Magic of ELFs
- Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- Title not available (Why is that?)
- Using indistinguishability obfuscation via UCEs
Cited In (7)
- On cryptography with auxiliary input
- Leakage-resilient cryptography from minimal assumptions
- Unifying leakage classes: simulatable leakage and pseudoentropy
- Leakage-resilient storage
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- How to fake auxiliary input
- Constructing tree decompositions of graphs with bounded gonality
This page was built for publication: Leakage resilient one-way functions: the auxiliary-input setting
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1784737)