Fully leakage-resilient signatures
From MaRDI portal
Publication:2392093
Recommendations
Cites work
- scientific article; zbMATH DE number 4191103 (Why is no real title available?)
- scientific article; zbMATH DE number 1088257 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- A Framework for Efficient and Composable Oblivious Transfer
- A Leakage-Resilient Mode of Operation
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Bonsai trees, or how to delegate a lattice basis
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Computationally Sound Proofs
- Cryptography and Game Theory: Designing Protocols for Exchanging Information
- Cryptography with tamperable and leaky memory
- Efficient Identity-Based Encryption Without Random Oracles
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Efficient public-key cryptography in the presence of key leakage
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- How to leak on key updates
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-resilient signatures
- Leakage-resilient zero knowledge
- Lossy Trapdoor Functions and Their Applications
- Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security
- More constructions of lossy and correlation-secure trapdoor functions
- On cryptography with auxiliary input
- Perfect Non-interactive Zero Knowledge for NP
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Probabilistic encryption
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- Protecting cryptographic keys against continual leakage
- Public-Key Cryptographic Primitives Provably as Secure as Subset Sum
- Public-Key Cryptosystems Resilient to Key Leakage
- Public-key encryption in the bounded-retrieval model
- Public-key encryption schemes with auxiliary inputs
- Reconstructing RSA Private Keys from Random Key Bits
- Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups
- Short and Stateless Signatures from the RSA Assumption
- Signature schemes with bounded leakage resilience
- Signatures resilient to continual leakage on memory and computation
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Storing Secrets on Continually Leaky Devices
- Theory of Cryptography
- Theory of Cryptography
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Universal Arguments and their Applications
Cited in
(37)- Fully Leakage-Resilient Codes
- Naor-Yung Paradigm with Shared Randomness and Applications
- Hierarchical attribute based encryption with continuous leakage-resilience
- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions
- Signatures Resilient to Uninvertible Leakage
- New bounds on the local leakage resilience of Shamir's secret sharing scheme
- A black-box construction of strongly unforgeable signature scheme in the leakage setting
- A practical leakage-resilient signature scheme in the generic group model
- Efficient fully-leakage resilient one-more signature schemes
- On continual leakage of discrete log representations
- Black-box constructions of signature schemes in the bounded leakage setting
- Signature schemes with bounded leakage resilience
- Naor-Yung paradigm with shared randomness and applications
- A black-box construction of strongly unforgeable signature schemes in the bounded leakage model
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Efficiently testable circuits without conductivity
- Towards a ring analogue of the leftover hash lemma
- Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency
- Forward-security under continual leakage
- A leakage-resilient pairing-based variant of the Schnorr signature scheme
- Leakage-Resilient Signatures with Graceful Degradation
- Predictable arguments of knowledge
- Strong authenticated key exchange with auxiliary inputs
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model
- Leakage-resilient signatures
- Leakage-resilient ring signature schemes
- (In)security of ring-LWE under partial key exposure
- Fully leakage-resilient signatures with auxiliary inputs
- Signatures resilient to continual leakage on memory and computation
- Fully Leakage-Resilient Signatures
- Leakage resilient one-way functions: the auxiliary-input setting
- Mind your coins: fully leakage-resilient signatures with graceful degradation
- Signature schemes secure against hard-to-invert leakage
- Impossibility of black-box simulation against leakage attacks
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- Leakage-resilient group signature: definitions and constructions
- One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard model
This page was built for publication: Fully leakage-resilient signatures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2392093)