Tamper detection and continuous non-malleable codes
From MaRDI portal
Publication:5261640
DOI10.1007/978-3-662-46494-6_19zbMATH Open1359.94607OpenAlexW52346023MaRDI QIDQ5261640FDOQ5261640
Authors: Zahra Jafargholi, Daniel Wichs
Publication date: 6 July 2015
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46494-6_19
Recommendations
Cited In (33)
- Continuously non-malleable codes in the split-state model
- Non-malleable encryption: simpler, shorter, stronger
- Tight upper and lower bounds for leakage-resilient, locally decodable and updatable non-malleable codes
- Continuously non-malleable codes against bounded-depth tampering
- Subversion-resilient signatures: definitions, constructions and applications
- Non-malleable codes against lookahead tampering
- Efficient non-malleable codes and key-derivation for poly-size tampering circuits
- Continuous NMC secure against permutations and overwrites, with applications to CCA secure commitments
- Strong continuous non-malleable encoding schemes with tamper-detection
- Efficient public-key cryptography with bounded leakage and tamper resilience
- How to make the Cramer-Shoup cryptosystem secure against linear related-key attacks
- Codes for detection of limited view algebraic tampering
- Tight upper and lower bounds for leakage-resilient, locally decodable and updatable non-malleable codes
- Non-malleable codes
- Non-Malleable Codes from Additive Combinatorics
- Efficient completely non-malleable and RKA secure public key encryptions
- More efficient public-key cryptography with leakage and tamper resilience
- Impossibility on tamper-resilient cryptography with uniqueness properties
- Four-state non-malleable codes with explicit constant rate
- Non-malleable codes for partial functions with manipulation detection
- (Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates
- Nonmalleable extractors and codes, with their many tampered extensions
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
- Fully Leakage-Resilient Codes
- Public key encryption resilient to leakage and tampering attacks
- The Chaining Lemma and its application
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions
- Continuous non-malleable codes
- Bounded tamper resilience: how to go beyond the algebraic barrier
- Non-malleable fuzzy extractors
- Non-malleable Codes with Split-State Refresh
- Non-malleable functions and their applications
This page was built for publication: Tamper detection and continuous non-malleable codes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5261640)