Public key encryption resilient to leakage and tampering attacks
From MaRDI portal
Publication:2402358
DOI10.1016/j.jcss.2017.03.004zbMath1372.68090OpenAlexW2609063781WikidataQ123158038 ScholiaQ123158038MaRDI QIDQ2402358
Yu Yu, Shi-Feng Sun, Udaya Parampalli, Baodong Qin, Da-Wu Gu
Publication date: 7 September 2017
Published in: Journal of Computer and System Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jcss.2017.03.004
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Identity-Based Encryption Resilient to Continual Auxiliary Leakage
- Tamper and Leakage Resilience in the Split-State Model
- Continuous Non-malleable Key Derivation and Its Application to Related-Key Security
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Cryptography Secure against Related-Key Attacks and Tampering
- Public-Key Encryption Schemes with Auxiliary Inputs
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security
- Public-Key Encryption in the Bounded-Retrieval Model
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
- Circular-Secure Encryption from Decision Diffie-Hellman
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
- On cryptography with auxiliary input
- Cryptography with Tamperable and Leaky Memory
- Leakage-Resilient Non-malleable Codes
- Tamper Detection and Continuous Non-malleable Codes
- Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
- Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits
- Efficient Leakage-Resilient Identity-Based Encryption with CCA Security
- Continuous Non-malleable Codes
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
- Theory of Cryptography