After-the-fact leakage in public-key encryption
From MaRDI portal
Publication:3000535
Recommendations
- Post-challenge leakage in public-key encryption
- Public key encryption resilient to post-challenge leakage and tampering attacks
- Efficient compilers for after-the-fact leakage: from CPA to CCA-2 secure PKE to AKE
- Public-Key Cryptosystems Resilient to Key Leakage
- Public-key cryptosystems resilient to key leakage
Cited in
(23)- Big-key symmetric encryption: resisting key exfiltration
- Fully Leakage-Resilient Codes
- Post-challenge leakage in public-key encryption
- Continuously non-malleable codes with split-state refresh
- Efficient compilers for after-the-fact leakage: from CPA to CCA-2 secure PKE to AKE
- Strong continuous non-malleable encoding schemes with tamper-detection
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
- Efficient public-key cryptography with bounded leakage and tamper resilience
- CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not $$\mathtt {q}$$ -type) Assumptions
- Randomness leakage in the KEM/DEM framework
- New approach to practical leakage-resilient public-key cryptography
- Continuous After-the-Fact Leakage-Resilient Key Exchange
- Strong authenticated key exchange with auxiliary inputs
- On the leakage-resilient key exchange
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model
- Post-Compromise Security in Self-Encryption
- On the connection between leakage tolerance and adaptive security
- On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives
- Leakage-resilient cryptography from minimal assumptions
- How to Compute in the Presence of Leakage
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- Strongly leakage resilient authenticated key exchange, revisited
- Secure computation from leaky correlated randomness
This page was built for publication: After-the-fact leakage in public-key encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3000535)