Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
From MaRDI portal
Publication:3596396
Recommendations
Cited in
(18)- The generic construction of continuous leakage-resilient identity-based cryptosystems
- Incompressible encodings
- Big-key symmetric encryption: resisting key exfiltration
- A Leakage-Resilient Mode of Operation
- Efficient and Provable White-Box Primitives
- Theory of Cryptography
- Continuous leakage-resilient identity-based encryption with leakage amplification
- Static-memory-hard functions, and modeling the cost of space vs. time
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience
- A lower bound on the key length of information-theoretic forward-secure storage schemes
- Intrusion-Resilient Secure Channels
- Leakage-resilient cryptography from minimal assumptions
- Bounded-retrieval model with keys derived from private data
- An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys
- A modular approach to the incompressibility of block-cipher-based AEADs
- IBE with incompressible master secret and small identity secrets
- Crypto galore!
- Incompressible cryptography
This page was built for publication: Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3596396)