Efficient public-key cryptography with bounded leakage and tamper resilience
From MaRDI portal
Publication:2958151
Recommendations
- Public key encryption resilient to leakage and tampering attacks
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Efficient public-key cryptography in the presence of key leakage
- Cryptography with tamperable and leaky memory
- Public key encryption resilient to post-challenge leakage and tampering attacks
Cites work
- scientific article; zbMATH DE number 1302835 (Why is no real title available?)
- scientific article; zbMATH DE number 1088257 (Why is no real title available?)
- scientific article; zbMATH DE number 2009976 (Why is no real title available?)
- scientific article; zbMATH DE number 2086698 (Why is no real title available?)
- A Pseudorandom Generator from any One-way Function
- A public key cryptosystem based on a subgroup membership problem
- Advances in Cryptology – CRYPTO 2004
- After-the-fact leakage in public-key encryption
- An algebraic framework for pseudorandom functions and applications to related-key security
- Bounded tamper resilience: how to go beyond the algebraic barrier
- Continuous non-malleable codes
- Continuous non-malleable key derivation and its application to related-key security
- Correlated-input secure hash functions
- Cryptography secure against related-key attacks and tampering
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Efficient non-malleable codes and key-derivation for poly-size tampering circuits
- Efficient public-key cryptography in the presence of key leakage
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Fast Software Encryption
- Fully leakage-resilient signatures
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Garbling XOR gates ``for free in the standard model
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Improved constructions of PRFs secure against related-key attacks
- Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing
- Mind your coins: fully leakage-resilient signatures with graceful degradation
- Non-malleable codes for bounded depth, bounded fan-in circuits
- Non-malleable functions and their applications
- On related-secret pseudorandomness
- Private Circuits II: Keeping Secrets in Tamperable Circuits
- Pseudorandom functions and permutations provably secure against related-key attacks
- Public Key Encryption against Related Key Attacks
- Public-Key Cryptosystems Resilient to Key Leakage
- RKA security beyond the linear barrier: IBE, encryption and signatures
- Related randomness attacks for public key encryption
- Related-key security for hybrid encryption
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Security Against Related Randomness Attacks via Reconstructive Extractors
- Signature schemes with bounded leakage resilience
- Tamper and Leakage Resilience in the Split-State Model
- Tamper detection and continuous non-malleable codes
- Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
- The Chaining Lemma and its application
- Theory of Cryptography
Cited in
(25)- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Reducing the cost of authenticity with leakages: a CIML2-secure AE scheme with one call to a strongly protected tweakable block cipher
- Cryptography with tamperable and leaky memory
- Security of hedged Fiat-Shamir signatures under fault attacks
- Efficient public-key cryptography with bounded leakage and tamper resilience
- New approach to practical leakage-resilient public-key cryptography
- Efficient public-key cryptography in the presence of key leakage
- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
- The generic construction of continuous leakage-resilient identity-based cryptosystems
- Leakage-resilient hierarchical identity-based encryption with recipient anonymity
- More efficient public-key cryptography with leakage and tamper resilience
- Witness maps and applications
- Impossibility on tamper-resilient cryptography with uniqueness properties
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Continuously non-malleable codes with split-state refresh
- Public key encryption resilient to post-challenge leakage and tampering attacks
- Continuous leakage-resilient identity-based encryption with leakage amplification
- Efficient fully secure leakage-deterring encryption
- Public key encryption resilient to leakage and tampering attacks
- Structure-preserving public-key encryption with leakage-resilient CCA security
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Bounded tamper resilience: how to go beyond the algebraic barrier
- Bounded tamper resilience: how to go beyond the algebraic barrier
- Non-malleable Codes with Split-State Refresh
- More efficient post-quantum KEMTLS with pre-distributed public keys
This page was built for publication: Efficient public-key cryptography with bounded leakage and tamper resilience
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2958151)