Leakage-Resilient Signatures

From MaRDI portal
Publication:3408204

DOI10.1007/978-3-642-11799-2_21zbMath1274.94135OpenAlexW1483290420WikidataQ59163708 ScholiaQ59163708MaRDI QIDQ3408204

Eike Kiltz, Sebastian Faust, Krzysztof Pietrzak, Guy N. Rothblum

Publication date: 24 February 2010

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-11799-2_21




Related Items (25)

Witness Maps and ApplicationsSignature schemes secure against hard-to-invert leakageMind Your Coins: Fully Leakage-Resilient Signatures with Graceful DegradationHow to Compute in the Presence of LeakageFully Homomorphic Encryption with Auxiliary InputsA Practical Leakage-Resilient Signature Scheme in the Generic Group ModelLeakage Resilient One-Way Functions: The Auxiliary-Input SettingAdaptive-secure identity-based inner-product functional encryption and its leakage-resilienceFully leakage-resilient signaturesOn the leakage-resilient key exchangeSecurity of message authentication codes in the presence of key-dependent messagesTamper-Proof Circuits: How to Trade Leakage for Tamper-ResilienceLeakage-resilient attribute based encryption in prime-order groups via predicate encodingsOn the Connection between Leakage Tolerance and Adaptive SecurityLeakage resilient one-way functions: the auxiliary-input settingRobust Pseudo-Random Number Generators with Input Secure Against Side-Channel AttacksLeakage-Resilient Cryptography over Large Finite Fields: Theory and PracticeFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelLeakage-Resilient Hierarchical Identity-Based Encryption with Recipient AnonymityA unified approach to deterministic encryption: new constructions and a connection to computational entropyLeakage Resilient Strong Key-Insulated Signatures in Public ChannelLeakage-Resilient SignaturesPublic-Key Encryption Schemes with Auxiliary InputsContinuous leakage-resilient identity-based encryption with leakage amplificationMode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle



Cites Work


This page was built for publication: Leakage-Resilient Signatures