Leakage-Resilient Signatures
From MaRDI portal
Publication:3408204
DOI10.1007/978-3-642-11799-2_21zbMath1274.94135OpenAlexW1483290420WikidataQ59163708 ScholiaQ59163708MaRDI QIDQ3408204
Eike Kiltz, Sebastian Faust, Krzysztof Pietrzak, Guy N. Rothblum
Publication date: 24 February 2010
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-11799-2_21
Related Items (25)
Witness Maps and Applications ⋮ Signature schemes secure against hard-to-invert leakage ⋮ Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation ⋮ How to Compute in the Presence of Leakage ⋮ Fully Homomorphic Encryption with Auxiliary Inputs ⋮ A Practical Leakage-Resilient Signature Scheme in the Generic Group Model ⋮ Leakage Resilient One-Way Functions: The Auxiliary-Input Setting ⋮ Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience ⋮ Fully leakage-resilient signatures ⋮ On the leakage-resilient key exchange ⋮ Security of message authentication codes in the presence of key-dependent messages ⋮ Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience ⋮ Leakage-resilient attribute based encryption in prime-order groups via predicate encodings ⋮ On the Connection between Leakage Tolerance and Adaptive Security ⋮ Leakage resilient one-way functions: the auxiliary-input setting ⋮ Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks ⋮ Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity ⋮ A unified approach to deterministic encryption: new constructions and a connection to computational entropy ⋮ Leakage Resilient Strong Key-Insulated Signatures in Public Channel ⋮ Leakage-Resilient Signatures ⋮ Public-Key Encryption Schemes with Auxiliary Inputs ⋮ Continuous leakage-resilient identity-based encryption with leakage amplification ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-Resilient Signatures
- Public-Key Encryption Schemes with Auxiliary Inputs
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- One-Time Programs
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- A Leakage-Resilient Mode of Operation
- Signature Schemes with Bounded Leakage Resilience
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- On cryptography with auxiliary input
- Attacking Unbalanced RSA-CRT Using SPA
- Advances in Cryptology - CRYPTO 2003
- On Forward-Secure Storage
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
- Theory of Cryptography
This page was built for publication: Leakage-Resilient Signatures