Leakage-resilient cryptography from minimal assumptions
From MaRDI portal
Publication:315546
DOI10.1007/S00145-015-9200-XzbMATH Open1348.94054OpenAlexW2100601773MaRDI QIDQ315546FDOQ315546
Authors: Carmit Hazay, Adriana López-Alt, Hoeteck Wee, Daniel Wichs
Publication date: 21 September 2016
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-015-9200-x
Recommendations
- Leakage-resilient cryptography from minimal assumptions
- Leakage-resilient identity-based cryptography from minimal assumptions
- Leakage-resilient symmetric cryptography under empirically verifiable assumptions
- Practical leakage-resilient symmetric cryptography
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- On the leakage-resilient key exchange
- Leakage-resilient cryptography from the inner-product extractor
- Limits of a conjecture on a leakage-resilient cryptosystem
- Leakage-resilient public-key encryption from obfuscation
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
Cites Work
- Efficient public-key cryptography in the presence of key leakage
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- A Pseudorandom Generator from any One-way Function
- Title not available (Why is that?)
- Title not available (Why is that?)
- Public-key cryptosystems resilient to key leakage
- Fully Leakage-Resilient Signatures
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- A Leakage-Resilient Mode of Operation
- Signature schemes with bounded leakage resilience
- Title not available (Why is that?)
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
- Advances in Cryptology - CRYPTO 2003
- Randomness is linear in space
- A parallel repetition theorem for leakage resilience
- Leakage-Tolerant Interactive Protocols
- Message authentication, revisited
- Parallel Repetition for Leakage Resilience Amplification Revisited
- After-the-fact leakage in public-key encryption
- How to Compute in the Presence of Leakage
- Public-key encryption in the bounded-retrieval model
- How leaky is an extractor?
- Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Overcoming weak expectations
- Leakage-resilient zero knowledge
- How to leak on key updates
- Advances in Cryptology - CRYPTO 2003
- Storing Secrets on Continually Leaky Devices
- Theory of Cryptography
- Theory of Cryptography
Cited In (19)
- A Leakage-Resilient Mode of Operation
- Leakage-Resilient Coin Tossing
- On Provable Security of wPRF-Based Leakage-Resilient Stream Ciphers
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Leakage-resilient cryptography from minimal assumptions
- Leakage resilient one-way functions: the auxiliary-input setting
- Unifying leakage classes: simulatable leakage and pseudoentropy
- New Developments in Leakage-Resilient Cryptography
- On differential privacy and adaptive data analysis with bounded space
- A group identification protocol with leakage resilience of secret sharing scheme
- Unprovability of leakage-resilient cryptography beyond the information-theoretic limit
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- Fully Leakage-Resilient Codes
- A parallel repetition theorem for leakage resilience
- Practical leakage-resilient symmetric cryptography
- NIZK from SNARGs
- Randomness leakage in the KEM/DEM framework
- Key-policy attribute-based encryption against continual auxiliary input leakage
This page was built for publication: Leakage-resilient cryptography from minimal assumptions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q315546)