Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
From MaRDI portal
Publication:3179355
DOI10.1007/978-3-662-53641-4_6zbMath1369.94547OpenAlexW2535600190MaRDI QIDQ3179355
Publication date: 21 December 2016
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53641-4_6
Related Items
Regular lossy functions and their applications in leakage-resilient cryptography ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation ⋮ Leakage resilient one-way functions: the auxiliary-input setting
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On strong simulation and composable point obfuscation
- Fully leakage-resilient signatures
- The Magic of ELFs
- Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation
- Using Indistinguishability Obfuscation via UCEs
- Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Lossy Trapdoor Functions and Their Applications
- Leakage-Resilient Signatures
- Public-Key Encryption Schemes with Auxiliary Inputs
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
- Leakage-Resilient Storage
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- A Leakage-Resilient Mode of Operation
- Signature Schemes with Bounded Leakage Resilience
- Survey: Leakage Resilience and the Bounded Retrieval Model
- On cryptography with auxiliary input
- Protecting Circuits from Computationally Bounded and Noisy Leakage
- Multiparty computation secure against continual memory leakage
- Advances in Cryptology - CRYPTO 2003
- Obfuscating Point Functions with Multibit Output
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography