How to Compute in the Presence of Leakage
From MaRDI portal
Publication:3449567
DOI10.1137/130931461zbMath1353.94049OpenAlexW2113960803MaRDI QIDQ3449567
Shafi Goldwasser, Guy N. Rothblum
Publication date: 4 November 2015
Published in: SIAM Journal on Computing (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/1721.1/115437
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computational difficulty of problems (lower bounds, completeness, difficulty of approximation, etc.) (68Q17)
Related Items
Leakage-resilient cryptography from minimal assumptions, On the impossibility of cryptography with tamperable randomness, Interleaved Group Products, Classical leakage resilience from fault-tolerant quantum computation, On the local leakage resilience of linear secret sharing schemes
Cites Work
- Unnamed Item
- Unnamed Item
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Leakage-Resilient Circuits without Computational Assumptions
- How to Compute under $${\mathcal {\varvec{AC}}}^\mathbf{0}$$ Leakage without Secure Hardware
- Achieving Leakage Resilience through Dual System Encryption
- After-the-Fact Leakage in Public-Key Encryption
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Leakage-Resilient Cryptography from the Inner-Product Extractor
- Program Obfuscation with Leaky Hardware
- Founding Cryptography on Tamper-Proof Hardware Tokens
- Leakage-Resilient Signatures
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- Protecting Cryptographic Keys against Continual Leakage
- Securing Computation against Continuous Leakage
- Leakage-Resilient Storage
- One-Time Programs
- Circular-Secure Encryption from Decision Diffie-Hellman
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- A Leakage-Resilient Mode of Operation
- Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity
- Software protection and simulation on oblivious RAMs
- Multiplying matrices faster than coppersmith-winograd
- Multiparty computation secure against continual memory leakage
- Secure computation with information leaking to an adversary
- How to leak on key updates
- Advances in Cryptology - CRYPTO 2003
- Storing Secrets on Continually Leaky Devices
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography