Leakage resilient one-way functions: the auxiliary-input setting
From MaRDI portal
(Redirected from Publication:1784737)
Recommendations
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- Unprovability of leakage-resilient cryptography beyond the information-theoretic limit
- Leakage-resilient cryptography from minimal assumptions
- Leakage-resilient cryptography from minimal assumptions
- Signature schemes secure against hard-to-invert leakage
Cites work
- scientific article; zbMATH DE number 1722684 (Why is no real title available?)
- scientific article; zbMATH DE number 1088253 (Why is no real title available?)
- A Leakage-Resilient Mode of Operation
- Advances in Cryptology - CRYPTO 2003
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Efficient public-key cryptography in the presence of key leakage
- Exposure-resilient functions and all-or-nothing transforms
- Fully leakage-resilient signatures
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks
- Leakage-resilient signatures
- Leakage-resilient storage
- Lossy Trapdoor Functions and Their Applications
- Multiparty computation secure against continual memory leakage
- Obfuscating Point Functions with Multibit Output
- On cryptography with auxiliary input
- On strong simulation and composable point obfuscation
- Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation
- Protecting circuits from computationally bounded and noisy leakage
- Public-key cryptosystems resilient to key leakage
- Public-key encryption schemes with auxiliary inputs
- Signature schemes with bounded leakage resilience
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Survey: leakage resilience and the bounded retrieval model
- The Magic of ELFs
- Theory of Cryptography
- Using indistinguishability obfuscation via UCEs
Cited in
(7)- On cryptography with auxiliary input
- Leakage-resilient cryptography from minimal assumptions
- Unifying leakage classes: simulatable leakage and pseudoentropy
- Leakage-resilient storage
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- How to fake auxiliary input
- Constructing tree decompositions of graphs with bounded gonality
This page was built for publication: Leakage resilient one-way functions: the auxiliary-input setting
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1784737)