Cryptography secure against related-key attacks and tampering
From MaRDI portal
Publication:3102205
DOI10.1007/978-3-642-25385-0_26zbMATH Open1227.94028OpenAlexW2157980705MaRDI QIDQ3102205FDOQ3102205
Authors: M. Bellare, David Cash, Rachel Miller
Publication date: 2 December 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25385-0_26
Recommendations
- scientific article; zbMATH DE number 2009976
- Improved constructions of PRFs secure against related-key attacks
- Pseudorandom functions and permutations provably secure against related-key attacks
- Related-key security for pseudorandom functions beyond the linear barrier
- Related-key security for pseudorandom functions beyond the linear barrier
Cited In (46)
- Continuously non-malleable codes in the split-state model
- Continuously non-malleable codes against bounded-depth tampering
- Title not available (Why is that?)
- Relations between robustness and RKA security under public-key encryption
- Subversion-resilient signatures: definitions, constructions and applications
- Notions and relations for RKA-secure permutation and function families
- Secure message authentication against related-key attack
- Related-key security for pseudorandom functions beyond the linear barrier
- Clever arbiters versus malicious adversaries. On the gap between known-input security and chosen-input security
- Classical and physical security of symmetric key cryptographic algorithms
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Basing cryptographic protocols on tamper-evident seals
- Related-key almost universal hash functions: definitions, constructions and applications
- How to make the Cramer-Shoup cryptosystem secure against linear related-key attacks
- Beyond Uber: instantiating generic groups via PGGs
- Fuzzy signatures: relaxing requirements and a new construction
- Provably-secure remote memory attestation for heap overflow protection
- Public-key puncturable encryption: modular and compact constructions
- Network coding signature schemes against related-key attacks in the random oracle model
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system
- Title not available (Why is that?)
- Fine-Grained Cryptography
- Functional encryption: deterministic to randomized functions from simple assumptions
- Cryptography with constant input locality
- Related-key security for pseudorandom functions beyond the linear barrier
- Efficient completely non-malleable and RKA secure public key encryptions
- Public Key Encryption against Related Key Attacks
- Impossibility on tamper-resilient cryptography with uniqueness properties
- On the related-key attack security of authenticated encryption schemes
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
- Practical non-malleable codes from symmetric-key primitives in 2-split-state model
- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers
- Public key encryption resilient to leakage and tampering attacks
- The Chaining Lemma and its application
- Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions
- Bounded tamper resilience: how to go beyond the algebraic barrier
- Bounded tamper resilience: how to go beyond the algebraic barrier
- Robust digital signature revisited
- On the security of remotely keyed encryption
- Non-malleable Codes with Split-State Refresh
- Improved constructions of PRFs secure against related-key attacks
- Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE
- Non-malleable functions and their applications
This page was built for publication: Cryptography secure against related-key attacks and tampering
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3102205)