Signature schemes secure against hard-to-invert leakage
From MaRDI portal
Publication:290397
DOI10.1007/S00145-015-9197-1zbMATH Open1355.94053OpenAlexW1998630298MaRDI QIDQ290397FDOQ290397
Authors: Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel
Publication date: 1 June 2016
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-015-9197-1
Recommendations
Cites Work
- On lattices, learning with errors, random linear codes, and cryptography
- Efficient public-key cryptography in the presence of key leakage
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Trapdoors for hard lattices and new cryptographic constructions
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Leakage-resilient circuits without computational assumptions
- Identity-based encryption resilient to continual auxiliary leakage
- Achieving leakage resilience through dual system encryption
- Signatures resilient to continual leakage on memory and computation
- Fully Leakage-Resilient Signatures
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-resilient signatures
- Public-key encryption schemes with auxiliary inputs
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Circular-Secure Encryption from Decision Diffie-Hellman
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- A Leakage-Resilient Mode of Operation
- Signature schemes with bounded leakage resilience
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Leakage-resilient cryptography from minimal assumptions
- On cryptography with auxiliary input
- Better security for deterministic public-key encryption: the auxiliary-input setting
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
Cited In (14)
- A black-box construction of strongly unforgeable signature scheme in the leakage setting
- Leakage-resilient group signature: definitions and constructions
- Signatures Resilient to Uninvertible Leakage
- Signature schemes secure against hard-to-invert leakage
- Efficient public-key cryptography in the presence of key leakage
- Leakage resilient one-way functions: the auxiliary-input setting
- Leakage-resilient signatures
- Black-box constructions of signature schemes in the bounded leakage setting
- Title not available (Why is that?)
- Fully leakage-resilient signatures with auxiliary inputs
- Fully Leakage-Resilient Signatures
- A black-box construction of strongly unforgeable signature schemes in the bounded leakage model
- Leakage-resilient ring signature schemes
- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions
This page was built for publication: Signature schemes secure against hard-to-invert leakage
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q290397)