Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
From MaRDI portal
Publication:3596396
DOI10.1007/978-3-540-70936-7_26zbMath1156.94338OpenAlexW1591813095MaRDI QIDQ3596396
Shabsi Walfish, David Cash, Yan Zong Ding, Richard J. Lipton, Yevgeniy Dodis, Wenke Lee
Publication date: 30 August 2007
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-70936-7_26
Related Items (15)
Static-memory-hard functions, and modeling the cost of space vs. time ⋮ The generic construction of continuous leakage-resilient identity-based cryptosystems ⋮ Leakage-resilient cryptography from minimal assumptions ⋮ Crypto Galore! ⋮ Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience ⋮ Incompressible cryptography ⋮ IBE with incompressible master secret and small identity secrets ⋮ Efficient and Provable White-Box Primitives ⋮ A modular approach to the incompressibility of block-cipher-based AEADs ⋮ Bounded-Retrieval Model with Keys Derived from Private Data ⋮ A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes ⋮ A Leakage-Resilient Mode of Operation ⋮ Big-Key Symmetric Encryption: Resisting Key Exfiltration ⋮ Continuous leakage-resilient identity-based encryption with leakage amplification ⋮ Incompressible encodings
This page was built for publication: Intrusion-Resilient Key Exchange in the Bounded Retrieval Model