Unprovability of leakage-resilient cryptography beyond the information-theoretic limit
From MaRDI portal
Publication:2106672
Recommendations
- Limits of a conjecture on a leakage-resilient cryptosystem
- Leakage-resilient cryptography from minimal assumptions
- Leakage-resilient cryptography from minimal assumptions
- Leakage-resilient symmetric cryptography under empirically verifiable assumptions
- Quantifying information leakage of randomized protocols
- Quantifying information leakage of randomized protocols
- Unconditionally secure computation against low-complexity leakage
- Unconditionally secure computation against low-complexity leakage
- Leakage-resilient cryptography from puncturable primitives and obfuscation
Cited in
(6)- Impossibility on tamper-resilient cryptography with uniqueness properties
- Leakage-resilient storage
- Barriers in cryptography with weak, correlated and leaky sources
- Leakage resilient one-way functions: the auxiliary-input setting
- Impossibility of black-box simulation against leakage attacks
- The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy
This page was built for publication: Unprovability of leakage-resilient cryptography beyond the information-theoretic limit
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2106672)