After-the-Fact Leakage in Public-Key Encryption
From MaRDI portal
Publication:3000535
DOI10.1007/978-3-642-19571-6_8zbMath1295.94078OpenAlexW1588165891MaRDI QIDQ3000535
Publication date: 19 May 2011
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_8
Related Items (20)
How to Compute in the Presence of Leakage ⋮ Leakage-resilient cryptography from minimal assumptions ⋮ Secure Computation from Leaky Correlated Randomness ⋮ Strong authenticated key exchange with auxiliary inputs ⋮ Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks ⋮ On the leakage-resilient key exchange ⋮ Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience ⋮ Strong continuous non-malleable encoding schemes with tamper-detection ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation ⋮ On the Connection between Leakage Tolerance and Adaptive Security ⋮ Post-challenge leakage in public-key encryption ⋮ Fully Leakage-Resilient Codes ⋮ New approach to practical leakage-resilient public-key cryptography ⋮ CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not $$\mathtt {q}$$ -type) Assumptions ⋮ Continuously non-malleable codes with split-state refresh ⋮ On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ Randomness Leakage in the KEM/DEM Framework ⋮ Big-Key Symmetric Encryption: Resisting Key Exfiltration ⋮ Strongly leakage resilient authenticated key exchange, revisited
This page was built for publication: After-the-Fact Leakage in Public-Key Encryption