Leakage-resilient cryptography from minimal assumptions
From MaRDI portal
Publication:4924409
Recommendations
Cited in
(31)- Leakage resilience from program obfuscation
- Leakage-Resilient Coin Tossing
- On Provable Security of wPRF-Based Leakage-Resilient Stream Ciphers
- Signature schemes secure against hard-to-invert leakage
- Deterministic Public-Key Encryption Under Continual Leakage
- Strong continuous non-malleable encoding schemes with tamper-detection
- Leakage-resilient IND-CCA KEM from the extractable hash proofs with indistinguishability obfuscation
- Regular lossy functions and their applications in leakage-resilient cryptography
- Targeted lossy functions and applications
- Public-key cryptosystems resilient to key leakage
- Leakage-resilient cryptography from minimal assumptions
- A map of witness maps: new definitions and connections
- Leakage resilient one-way functions: the auxiliary-input setting
- New Developments in Leakage-Resilient Cryptography
- Leakage-resilient identity-based cryptography from minimal assumptions
- The generic construction of continuous leakage-resilient identity-based cryptosystems
- Efficient leakage-resilient MACs without idealized assumptions
- Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks
- Unprovability of leakage-resilient cryptography beyond the information-theoretic limit
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- Continuous leakage-resilient identity-based encryption with leakage amplification
- IBE with incompressible master secret and small identity secrets
- Fully Leakage-Resilient Codes
- A Leakage Resilient MAC
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
- Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority
- Rate-1 incompressible encryption from standard assumptions
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
- Constructions secure against receiver selective opening and chosen ciphertext attacks
- Strong authenticity with leakage under weak and falsifiable physical assumptions
This page was built for publication: Leakage-resilient cryptography from minimal assumptions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4924409)