Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
From MaRDI portal
Publication:2958152
Recommendations
- Public-key cryptosystems resilient to key leakage
- Public-Key Cryptosystems Resilient to Key Leakage
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Public-key encryption scheme with optimal continuous leakage resilience
- Public key encryption resilient to leakage and tampering attacks
- Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
- Public key encryption resilient to post-challenge leakage and tampering attacks
- New approach to practical leakage-resilient public-key cryptography
- Deterministic Public-Key Encryption Under Continual Leakage
- Efficient public-key cryptography in the presence of key leakage
Cites work
- scientific article; zbMATH DE number 2009976 (Why is no real title available?)
- scientific article; zbMATH DE number 2086698 (Why is no real title available?)
- A New Randomness Extraction Paradigm for Hybrid Encryption
- A new algorithm for optimization
- Advances in Cryptology – CRYPTO 2004
- Bounded tamper resilience: how to go beyond the algebraic barrier
- Circular-Secure Encryption from Decision Diffie-Hellman
- Continuous non-malleable codes
- Continuous non-malleable key derivation and its application to related-key security
- Cryptography secure against related-key attacks and tampering
- Cryptography with tamperable and leaky memory
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions
- Efficient public-key cryptography in the presence of key leakage
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing
- Lossy trapdoor functions and their applications
- On continual leakage of discrete log representations
- Optimal algebraic manipulation detection codes in the constant-error model
- Pseudorandom functions and permutations provably secure against related-key attacks
- Public Key Encryption against Related Key Attacks
- Public-Key Cryptosystems Resilient to Key Leakage
- RKA security beyond the linear barrier: IBE, encryption and signatures
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Tamper and Leakage Resilience in the Split-State Model
- Tamper detection and continuous non-malleable codes
- Theory of Cryptography
- Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23--25, 2015. Proceedings, Part II
Cited in
(16)- Distributed public key schemes secure against continual leakage
- Cryptography with tamperable and leaky memory
- Security of hedged Fiat-Shamir signatures under fault attacks
- Deterministic Public-Key Encryption Under Continual Leakage
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Cryptographically resilient functions
- The generic construction of continuous leakage-resilient identity-based cryptosystems
- More efficient public-key cryptography with leakage and tamper resilience
- Witness maps and applications
- Impossibility on tamper-resilient cryptography with uniqueness properties
- Continuously non-malleable codes with split-state refresh
- Public key encryption resilient to post-challenge leakage and tampering attacks
- Continuous leakage-resilient identity-based encryption with leakage amplification
- Public key encryption resilient to leakage and tampering attacks
- Structure-preserving public-key encryption with leakage-resilient CCA security
- Bounded tamper resilience: how to go beyond the algebraic barrier
This page was built for publication: Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2958152)