After-the-Fact Leakage in Public-Key Encryption
From MaRDI portal
Publication:3000535
DOI10.1007/978-3-642-19571-6_8zbMath1295.94078MaRDI QIDQ3000535
Publication date: 19 May 2011
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_8
94A60: Cryptography
Related Items
On the Connection between Leakage Tolerance and Adaptive Security, Fully Leakage-Resilient Codes, Continuously non-malleable codes with split-state refresh, Leakage-resilient cryptography from minimal assumptions, On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives, Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model, On the leakage-resilient key exchange, Leakage-resilient cryptography from puncturable primitives and obfuscation, New approach to practical leakage-resilient public-key cryptography, Strong continuous non-malleable encoding schemes with tamper-detection, Post-challenge leakage in public-key encryption, Strongly leakage resilient authenticated key exchange, revisited, Strong authenticated key exchange with auxiliary inputs, Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks, Big-Key Symmetric Encryption: Resisting Key Exfiltration, Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience, Randomness Leakage in the KEM/DEM Framework, How to Compute in the Presence of Leakage, Secure Computation from Leaky Correlated Randomness