Signature schemes secure against hard-to-invert leakage
From MaRDI portal
Publication:290397
Recommendations
Cites work
- scientific article; zbMATH DE number 176565 (Why is no real title available?)
- scientific article; zbMATH DE number 1088257 (Why is no real title available?)
- scientific article; zbMATH DE number 1857508 (Why is no real title available?)
- scientific article; zbMATH DE number 1878336 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- A Leakage-Resilient Mode of Operation
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Achieving leakage resilience through dual system encryption
- Better security for deterministic public-key encryption: the auxiliary-input setting
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Circular-Secure Encryption from Decision Diffie-Hellman
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Efficient public-key cryptography in the presence of key leakage
- Fully Leakage-Resilient Signatures
- Identity-based encryption resilient to continual auxiliary leakage
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-resilient circuits without computational assumptions
- Leakage-resilient cryptography from minimal assumptions
- Leakage-resilient signatures
- On cryptography with auxiliary input
- On lattices, learning with errors, random linear codes, and cryptography
- Public-Key Cryptosystems Resilient to Key Leakage
- Public-key encryption schemes with auxiliary inputs
- Signature schemes with bounded leakage resilience
- Signatures resilient to continual leakage on memory and computation
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Theory of Cryptography
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Trapdoors for hard lattices and new cryptographic constructions
Cited in
(14)- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions
- Signatures Resilient to Uninvertible Leakage
- A black-box construction of strongly unforgeable signature scheme in the leakage setting
- Black-box constructions of signature schemes in the bounded leakage setting
- A black-box construction of strongly unforgeable signature schemes in the bounded leakage model
- scientific article; zbMATH DE number 1952892 (Why is no real title available?)
- Signature schemes secure against hard-to-invert leakage
- Leakage-resilient signatures
- Leakage-resilient ring signature schemes
- Fully leakage-resilient signatures with auxiliary inputs
- Fully Leakage-Resilient Signatures
- Leakage resilient one-way functions: the auxiliary-input setting
- Efficient public-key cryptography in the presence of key leakage
- Leakage-resilient group signature: definitions and constructions
This page was built for publication: Signature schemes secure against hard-to-invert leakage
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q290397)