Strong continuous non-malleable encoding schemes with tamper-detection
From MaRDI portal
Publication:2195381
DOI10.1016/j.ins.2018.03.065zbMath1446.94152OpenAlexW2795623173MaRDI QIDQ2195381
Mahmoud Salmasizadeh, Amir Daneshgar, Amir S. Mortazavi
Publication date: 8 September 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2018.03.065
Cites Work
- Unnamed Item
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
- Non-malleable coding against bit-wise and split-state tampering
- Non-Malleable Encryption: Simpler, Shorter, Stronger
- Optimal Computational Split-state Non-malleable Codes
- Non-malleable Codes from Two-Source Extractors
- On the Impossibility of Cryptography with Tamperable Randomness
- Tamper and Leakage Resilience in the Split-State Model
- Continuous Non-malleable Key Derivation and Its Application to Related-Key Security
- A Tamper and Leakage Resilient von Neumann Architecture
- Non-malleable Reductions and Applications
- After-the-Fact Leakage in Public-Key Encryption
- BiTR: Built-in Tamper Resilience
- Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations
- Public-Key Encryption in the Bounded-Retrieval Model
- Leakage-Resilient Storage
- Private Circuits II: Keeping Secrets in Tamperable Circuits
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Nonmalleable Cryptography
- Leakage-Resilient Cryptography from Minimal Assumptions
- Leakage-Resilient Zero Knowledge
- Non-malleable codes from additive combinatorics
- A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations
- Leakage-Resilient Non-malleable Codes
- Tamper Detection and Continuous Non-malleable Codes
- From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes
- Computational Complexity
- Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits
- Advances in Cryptology - CRYPTO 2003
- Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One
- Continuous Non-malleable Codes
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
This page was built for publication: Strong continuous non-malleable encoding schemes with tamper-detection