Limits of a conjecture on a leakage-resilient cryptosystem
From MaRDI portal
Publication:2445905
DOI10.1016/j.ipl.2013.11.014zbMath1296.94113OpenAlexW2061997785WikidataQ123231125 ScholiaQ123231125MaRDI QIDQ2445905
Publication date: 15 April 2014
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: http://orbilu.uni.lu/handle/10993/21827
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Factoring polynomials with rational coefficients
- The insecurity of the digital signature algorithm with partially known nonces
- Tamper and Leakage Resilience in the Split-State Model
- Leakage Resilient ElGamal Encryption
- Public-Key Encryption Schemes with Auxiliary Inputs
- Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Hidden number problem with hidden multipliers, timed-release crypto, and noisy exponentiation
- Hermite’s Constant and Lattice Algorithms
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Theory of Cryptography
- Lattice attacks on digital signature schemes
This page was built for publication: Limits of a conjecture on a leakage-resilient cryptosystem