Cryptography secure against related-key attacks and tampering
From MaRDI portal
Publication:3102205
Recommendations
- scientific article; zbMATH DE number 2009976
- Improved constructions of PRFs secure against related-key attacks
- Pseudorandom functions and permutations provably secure against related-key attacks
- Related-key security for pseudorandom functions beyond the linear barrier
- Related-key security for pseudorandom functions beyond the linear barrier
Cited in
(46)- Continuously non-malleable codes in the split-state model
- Relations between robustness and RKA security under public-key encryption
- scientific article; zbMATH DE number 2009976 (Why is no real title available?)
- Continuously non-malleable codes against bounded-depth tampering
- Subversion-resilient signatures: definitions, constructions and applications
- Notions and relations for RKA-secure permutation and function families
- Secure message authentication against related-key attack
- Related-key security for pseudorandom functions beyond the linear barrier
- Clever arbiters versus malicious adversaries. On the gap between known-input security and chosen-input security
- Classical and physical security of symmetric key cryptographic algorithms
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Basing cryptographic protocols on tamper-evident seals
- Related-key almost universal hash functions: definitions, constructions and applications
- How to make the Cramer-Shoup cryptosystem secure against linear related-key attacks
- Fuzzy signatures: relaxing requirements and a new construction
- Beyond Uber: instantiating generic groups via PGGs
- Provably-secure remote memory attestation for heap overflow protection
- Network coding signature schemes against related-key attacks in the random oracle model
- Public-key puncturable encryption: modular and compact constructions
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system
- Fine-Grained Cryptography
- scientific article; zbMATH DE number 2202020 (Why is no real title available?)
- Cryptography with constant input locality
- Functional encryption: deterministic to randomized functions from simple assumptions
- Related-key security for pseudorandom functions beyond the linear barrier
- Efficient completely non-malleable and RKA secure public key encryptions
- Public Key Encryption against Related Key Attacks
- Impossibility on tamper-resilient cryptography with uniqueness properties
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
- On the related-key attack security of authenticated encryption schemes
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
- Public key encryption resilient to leakage and tampering attacks
- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers
- Practical non-malleable codes from symmetric-key primitives in 2-split-state model
- The Chaining Lemma and its application
- Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions
- Bounded tamper resilience: how to go beyond the algebraic barrier
- Bounded tamper resilience: how to go beyond the algebraic barrier
- Robust digital signature revisited
- On the security of remotely keyed encryption
- Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE
- Improved constructions of PRFs secure against related-key attacks
- Non-malleable Codes with Split-State Refresh
- Non-malleable functions and their applications
This page was built for publication: Cryptography secure against related-key attacks and tampering
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3102205)