On continual leakage of discrete log representations
From MaRDI portal
Publication:2867167
Recommendations
Cited in
(13)- Continuous leakage-resilient certificate-based encryption
- On black-box knowledge-sound commit-and-prove SNARKs
- Indistinguishable proofs of work or knowledge
- New approach to practical leakage-resilient public-key cryptography
- Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage
- White box traitor tracing
- Impossibilities in succinct arguments: black-box extraction and more
- Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks
- The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free
- Updatable all-but-one dual projective hashing and its applications
- Continuous leakage-resilient identity-based encryption with leakage amplification
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Bounded tamper resilience: how to go beyond the algebraic barrier
This page was built for publication: On continual leakage of discrete log representations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2867167)