On continual leakage of discrete log representations
From MaRDI portal
Publication:2867167
DOI10.1007/978-3-642-42045-0_21zbMATH Open1326.94069OpenAlexW98320937MaRDI QIDQ2867167FDOQ2867167
Authors: Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs
Publication date: 10 December 2013
Published in: Advances in Cryptology - ASIACRYPT 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-42045-0_21
Recommendations
Cited In (13)
- Continuous leakage-resilient certificate-based encryption
- On black-box knowledge-sound commit-and-prove SNARKs
- New approach to practical leakage-resilient public-key cryptography
- Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage
- White box traitor tracing
- Impossibilities in succinct arguments: black-box extraction and more
- Indistinguishable Proofs of Work or Knowledge
- Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks
- The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free
- Updatable all-but-one dual projective hashing and its applications
- Continuous leakage-resilient identity-based encryption with leakage amplification
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Bounded tamper resilience: how to go beyond the algebraic barrier
This page was built for publication: On continual leakage of discrete log representations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2867167)