Leakage-resilient cryptography from minimal assumptions
From MaRDI portal
(Redirected from Publication:315546)
Recommendations
- Leakage-resilient cryptography from minimal assumptions
- Leakage-resilient identity-based cryptography from minimal assumptions
- Leakage-resilient symmetric cryptography under empirically verifiable assumptions
- Practical leakage-resilient symmetric cryptography
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- On the leakage-resilient key exchange
- Leakage-resilient cryptography from the inner-product extractor
- Limits of a conjecture on a leakage-resilient cryptosystem
- Leakage-resilient public-key encryption from obfuscation
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
Cites work
- scientific article; zbMATH DE number 3960854 (Why is no real title available?)
- scientific article; zbMATH DE number 1979273 (Why is no real title available?)
- scientific article; zbMATH DE number 1759794 (Why is no real title available?)
- scientific article; zbMATH DE number 2086698 (Why is no real title available?)
- scientific article; zbMATH DE number 1857508 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A Leakage-Resilient Mode of Operation
- A Pseudorandom Generator from any One-way Function
- A parallel repetition theorem for leakage resilience
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - CRYPTO 2003
- After-the-fact leakage in public-key encryption
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Efficient public-key cryptography in the presence of key leakage
- Fully Leakage-Resilient Signatures
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- How leaky is an extractor?
- How to Compute in the Presence of Leakage
- How to leak on key updates
- Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-Tolerant Interactive Protocols
- Leakage-resilient zero knowledge
- Message authentication, revisited
- Overcoming weak expectations
- Parallel Repetition for Leakage Resilience Amplification Revisited
- Public-Key Cryptosystems Resilient to Key Leakage
- Public-key cryptosystems resilient to key leakage
- Public-key encryption in the bounded-retrieval model
- Randomness is linear in space
- Signature schemes with bounded leakage resilience
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Storing Secrets on Continually Leaky Devices
- Theory of Cryptography
- Theory of Cryptography
- Theory of Cryptography
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
Cited in
(19)- Fully Leakage-Resilient Codes
- A Leakage-Resilient Mode of Operation
- New Developments in Leakage-Resilient Cryptography
- Leakage-resilient cryptography from minimal assumptions
- Randomness leakage in the KEM/DEM framework
- Anonymous IBE, leakage resilience and circular security from new assumptions
- On differential privacy and adaptive data analysis with bounded space
- Unprovability of leakage-resilient cryptography beyond the information-theoretic limit
- A parallel repetition theorem for leakage resilience
- Leakage-Resilient Coin Tossing
- NIZK from SNARGs
- Practical leakage-resilient symmetric cryptography
- A group identification protocol with leakage resilience of secret sharing scheme
- Unifying leakage classes: simulatable leakage and pseudoentropy
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- Leakage resilient one-way functions: the auxiliary-input setting
- On Provable Security of wPRF-Based Leakage-Resilient Stream Ciphers
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- Key-policy attribute-based encryption against continual auxiliary input leakage
This page was built for publication: Leakage-resilient cryptography from minimal assumptions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q315546)