Mind your coins: fully leakage-resilient signatures with graceful degradation
From MaRDI portal
Publication:3448807
Recommendations
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model
- Leakage-Resilient Signatures with Graceful Degradation
- Signature schemes with bounded leakage resilience
- Fully leakage-resilient signatures
- Fully Leakage-Resilient Signatures
Cites work
- scientific article; zbMATH DE number 1857508 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A second look at Fischlin's transformation
- Automata, Languages and Programming
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Efficient public-key cryptography in the presence of key leakage
- Fully Leakage-Resilient Signatures
- How to Protect Yourself without Perfect Shredding
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-Resilient Signatures with Graceful Degradation
- Leakage-Tolerant Interactive Protocols
- Leakage-resilient signatures
- Leakage-resilient storage
- Leakage-resilient zero knowledge
- On Forward-Secure Storage
- On the Non-malleability of the Fiat-Shamir Transform
- On the connection between leakage tolerance and adaptive security
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- Public-Key Cryptosystems Resilient to Key Leakage
- Signature schemes with bounded leakage resilience
- Signatures resilient to continual leakage on memory and computation
- Theory of Cryptography
- Theory of Cryptography
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Unifying leakage models: from probing attacks to noisy leakage.
Cited in
(15)- Subversion-resilient signatures: definitions, constructions and applications
- Tweakable $$\mathcal {S}_{\text{ leeve }}$$: A Novel $$\mathcal {S}_{\text{ leeve }}$$ Construction Based on Tweakable Hash Functions
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Leakage-Resilient Signatures with Graceful Degradation
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model
- Signature schemes with bounded leakage resilience
- Predictable arguments of knowledge
- Efficient fully-leakage resilient one-more signature schemes
- Witness maps and applications
- W-OTS\textsuperscript{+} up my sleeve! A hidden secure fallback for cryptocurrency wallets
- Naor-Yung paradigm with shared randomness and applications
- Fully leakage-resilient signatures
- Fully Leakage-Resilient Codes
- Leakage-resilient identification schemes from zero-knowledge proofs of storage
- Naor-Yung Paradigm with Shared Randomness and Applications
This page was built for publication: Mind your coins: fully leakage-resilient signatures with graceful degradation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3448807)