Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange
From MaRDI portal
Publication:3460112
DOI10.1007/978-3-319-27239-9_17zbMath1376.94024OpenAlexW2296137340MaRDI QIDQ3460112
Janaka Alawatugoda, Douglas Stebila, Colin A. Boyd
Publication date: 12 January 2016
Published in: Cryptography and Coding (Search for Journal in Brave)
Full work available at URL: https://eprints.qut.edu.au/91152/1/IMACC-AlaSteBoy15-full.pdf
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (3)
Standard model leakage-resilient authenticated key exchange using inner-product extractors ⋮ On the leakage-resilient key exchange ⋮ New approach to practical leakage-resilient public-key cryptography
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Signatures Resilient to Continual Leakage on Memory and Computation
- Leakage Resilient ElGamal Encryption
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Leakage-Resilient Cryptography from the Inner-Product Extractor
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Stronger Security of Authenticated Key Exchange
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Signature Schemes with Bounded Leakage Resilience
- New directions in cryptography
- Continuous After-the-Fact Leakage-Resilient Key Exchange
This page was built for publication: Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange