Mind your coins: fully leakage-resilient signatures with graceful degradation
From MaRDI portal
Publication:3448807
DOI10.1007/978-3-662-47672-7_37zbMATH Open1440.94049OpenAlexW2147702386MaRDI QIDQ3448807FDOQ3448807
Authors: Antonio Faonio, Jesper Buus Nielsen, D. Venturi
Publication date: 27 October 2015
Published in: Automata, Languages, and Programming (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-47672-7_37
Recommendations
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model
- Leakage-Resilient Signatures with Graceful Degradation
- Signature schemes with bounded leakage resilience
- Fully leakage-resilient signatures
- Fully Leakage-Resilient Signatures
Cites Work
- Efficient public-key cryptography in the presence of key leakage
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Title not available (Why is that?)
- Signatures resilient to continual leakage on memory and computation
- Fully Leakage-Resilient Signatures
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-resilient signatures
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Signature schemes with bounded leakage resilience
- Title not available (Why is that?)
- Public-Key Cryptosystems Resilient to Key Leakage
- On the Non-malleability of the Fiat-Shamir Transform
- Leakage-resilient storage
- Leakage-Tolerant Interactive Protocols
- Leakage-resilient zero knowledge
- Theory of Cryptography
- Theory of Cryptography
- How to Protect Yourself without Perfect Shredding
- On the connection between leakage tolerance and adaptive security
- A second look at Fischlin's transformation
- Leakage-Resilient Signatures with Graceful Degradation
- Automata, Languages and Programming
- On Forward-Secure Storage
- Unifying leakage models: from probing attacks to noisy leakage.
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
Cited In (15)
- Subversion-resilient signatures: definitions, constructions and applications
- Tweakable $$\mathcal {S}_{\text{ leeve }}$$: A Novel $$\mathcal {S}_{\text{ leeve }}$$ Construction Based on Tweakable Hash Functions
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Leakage-Resilient Signatures with Graceful Degradation
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model
- Signature schemes with bounded leakage resilience
- Predictable arguments of knowledge
- Efficient fully-leakage resilient one-more signature schemes
- Witness maps and applications
- W-OTS\textsuperscript{+} up my sleeve! A hidden secure fallback for cryptocurrency wallets
- Fully Leakage-Resilient Codes
- Naor-Yung paradigm with shared randomness and applications
- Fully leakage-resilient signatures
- Leakage-resilient identification schemes from zero-knowledge proofs of storage
- Naor-Yung Paradigm with Shared Randomness and Applications
This page was built for publication: Mind your coins: fully leakage-resilient signatures with graceful degradation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3448807)