Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
From MaRDI portal
Publication:3596396
DOI10.1007/978-3-540-70936-7_26zbMATH Open1156.94338OpenAlexW1591813095MaRDI QIDQ3596396FDOQ3596396
Authors: David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, Shabsi Walfish
Publication date: 30 August 2007
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-70936-7_26
Recommendations
Cited In (18)
- A Leakage-Resilient Mode of Operation
- Intrusion-Resilient Secure Channels
- Big-key symmetric encryption: resisting key exfiltration
- Bounded-retrieval model with keys derived from private data
- Theory of Cryptography
- Leakage-resilient cryptography from minimal assumptions
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience
- Incompressible cryptography
- The generic construction of continuous leakage-resilient identity-based cryptosystems
- Efficient and Provable White-Box Primitives
- IBE with incompressible master secret and small identity secrets
- Continuous leakage-resilient identity-based encryption with leakage amplification
- An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys
- Crypto galore!
- Incompressible encodings
- Static-memory-hard functions, and modeling the cost of space vs. time
- A lower bound on the key length of information-theoretic forward-secure storage schemes
- A modular approach to the incompressibility of block-cipher-based AEADs
This page was built for publication: Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3596396)