Leakage-resilient cryptography from minimal assumptions
From MaRDI portal
Publication:315546
DOI10.1007/s00145-015-9200-xzbMath1348.94054OpenAlexW2100601773MaRDI QIDQ315546
Hoeteck Wee, Adriana López-Alt, Carmit Hazay, Daniel Wichs
Publication date: 21 September 2016
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-015-9200-x
Related Items (5)
Anonymous IBE, leakage resilience and circular security from new assumptions ⋮ A group identification protocol with leakage resilience of secret sharing scheme ⋮ On differential privacy and adaptive data analysis with bounded space ⋮ NIZK from SNARGs ⋮ Key-policy attribute-based encryption against continual auxiliary input leakage
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Randomness is linear in space
- A Parallel Repetition Theorem for Leakage Resilience
- Leakage-Tolerant Interactive Protocols
- Message Authentication, Revisited
- Parallel Repetition for Leakage Resilience Amplification Revisited
- After-the-Fact Leakage in Public-Key Encryption
- Fully Leakage-Resilient Signatures
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- How to Compute in the Presence of Leakage
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Public-Key Encryption in the Bounded-Retrieval Model
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- How Leaky Is an Extractor?
- Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- A Leakage-Resilient Mode of Operation
- Signature Schemes with Bounded Leakage Resilience
- A Pseudorandom Generator from any One-way Function
- Overcoming Weak Expectations
- Leakage-Resilient Zero Knowledge
- How to leak on key updates
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - CRYPTO 2003
- Storing Secrets on Continually Leaky Devices
- Public-Key Cryptosystems Resilient to Key Leakage
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
- Theory of Cryptography
- Theory of Cryptography
This page was built for publication: Leakage-resilient cryptography from minimal assumptions