Signature schemes secure against hard-to-invert leakage
From MaRDI portal
Publication:290397
DOI10.1007/S00145-015-9197-1zbMATH Open1355.94053OpenAlexW1998630298MaRDI QIDQ290397FDOQ290397
Peter Sebastian Nordholt, Carmit Hazay, Jesper Buus Nielsen, Angela Zottarel, Sebastian Faust
Publication date: 1 June 2016
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-015-9197-1
Cites Work
- On lattices, learning with errors, random linear codes, and cryptography
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Trapdoors for hard lattices and new cryptographic constructions
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Leakage-Resilient Circuits without Computational Assumptions
- Identity-Based Encryption Resilient to Continual Auxiliary Leakage
- Achieving Leakage Resilience through Dual System Encryption
- Signatures Resilient to Continual Leakage on Memory and Computation
- Fully Leakage-Resilient Signatures
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-Resilient Signatures
- Public-Key Encryption Schemes with Auxiliary Inputs
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Circular-Secure Encryption from Decision Diffie-Hellman
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- A Leakage-Resilient Mode of Operation
- Signature Schemes with Bounded Leakage Resilience
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Leakage-Resilient Cryptography from Minimal Assumptions
- On cryptography with auxiliary input
- Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
Cited In (9)
- Leakage-resilient group signature: definitions and constructions
- A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model
- Signatures Resilient to Uninvertible Leakage
- A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting
- Black-box constructions of signature schemes in the bounded leakage setting
- Title not available (Why is that?)
- Fully Leakage-Resilient Signatures
- Leakage-resilient ring signature schemes
- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions
This page was built for publication: Signature schemes secure against hard-to-invert leakage
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q290397)