Cryptography with Tamperable and Leaky Memory
From MaRDI portal
Publication:5199202
DOI10.1007/978-3-642-22792-9_21zbMath1287.94077OpenAlexW2181974462MaRDI QIDQ5199202
Yael Tauman Kalai, Bhavana Kanukurthi, Amit Sahai
Publication date: 12 August 2011
Published in: Advances in Cryptology – CRYPTO 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-22792-9_21
Related Items (20)
Fully leakage-resilient signatures ⋮ Public key encryption resilient to leakage and tampering attacks ⋮ Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks ⋮ Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions ⋮ The Chaining Lemma and Its Application ⋮ On the impossibility of cryptography with tamperable randomness ⋮ Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions ⋮ Steganography-free zero-knowledge ⋮ Practical non-malleable codes from symmetric-key primitives in 2-split-state model ⋮ Continuously non-malleable codes in the split-state model ⋮ Leakage-resilient ring signature schemes ⋮ Non-Malleable Codes from Additive Combinatorics ⋮ Subversion-resilient signatures: definitions, constructions and applications ⋮ Bounded tamper resilience: how to go beyond the algebraic barrier ⋮ Leakage-resilient group signature: definitions and constructions ⋮ Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable Codes ⋮ Tight upper and lower bounds for leakage-resilient, locally decodable and updatable non-malleable codes ⋮ Continuously non-malleable codes with split-state refresh ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ Impossibility on tamper-resilient cryptography with uniqueness properties
This page was built for publication: Cryptography with Tamperable and Leaky Memory