Tamper detection and continuous non-malleable codes
From MaRDI portal
Publication:5261640
Recommendations
Cited in
(33)- Continuously non-malleable codes in the split-state model
- Non-malleable encryption: simpler, shorter, stronger
- Tight upper and lower bounds for leakage-resilient, locally decodable and updatable non-malleable codes
- Continuously non-malleable codes against bounded-depth tampering
- Subversion-resilient signatures: definitions, constructions and applications
- Non-malleable codes against lookahead tampering
- Efficient non-malleable codes and key-derivation for poly-size tampering circuits
- Continuous NMC secure against permutations and overwrites, with applications to CCA secure commitments
- Strong continuous non-malleable encoding schemes with tamper-detection
- Efficient public-key cryptography with bounded leakage and tamper resilience
- How to make the Cramer-Shoup cryptosystem secure against linear related-key attacks
- Codes for detection of limited view algebraic tampering
- Tight upper and lower bounds for leakage-resilient, locally decodable and updatable non-malleable codes
- Non-malleable codes
- Non-Malleable Codes from Additive Combinatorics
- Efficient completely non-malleable and RKA secure public key encryptions
- More efficient public-key cryptography with leakage and tamper resilience
- Non-malleable codes for partial functions with manipulation detection
- Impossibility on tamper-resilient cryptography with uniqueness properties
- Four-state non-malleable codes with explicit constant rate
- (Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates
- Nonmalleable extractors and codes, with their many tampered extensions
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
- Fully Leakage-Resilient Codes
- Public key encryption resilient to leakage and tampering attacks
- The Chaining Lemma and its application
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions
- Bounded tamper resilience: how to go beyond the algebraic barrier
- Continuous non-malleable codes
- Non-malleable fuzzy extractors
- Non-malleable Codes with Split-State Refresh
- Non-malleable functions and their applications
This page was built for publication: Tamper detection and continuous non-malleable codes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5261640)