Tamper detection and continuous non-malleable codes
From MaRDI portal
Publication:5261640
DOI10.1007/978-3-662-46494-6_19zbMATH Open1359.94607OpenAlexW52346023MaRDI QIDQ5261640FDOQ5261640
Authors: Zahra Jafargholi, Daniel Wichs
Publication date: 6 July 2015
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46494-6_19
Recommendations
Cited In (30)
- Continuously non-malleable codes in the split-state model
- Non-malleable encryption: simpler, shorter, stronger
- Tight upper and lower bounds for leakage-resilient, locally decodable and updatable non-malleable codes
- Continuously non-malleable codes against bounded-depth tampering
- The Chaining Lemma and Its Application
- Subversion-resilient signatures: definitions, constructions and applications
- Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable Codes
- Non-malleable codes against lookahead tampering
- Continuous NMC secure against permutations and overwrites, with applications to CCA secure commitments
- Strong continuous non-malleable encoding schemes with tamper-detection
- Nonmalleable Extractors and Codes, with Their Many Tampered Extensions
- Non-Malleable Codes from Additive Combinatorics
- Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
- Codes for Detection of Limited View Algebraic Tampering
- How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks
- Non-malleable coding against bit-wise and split-state tampering
- More efficient public-key cryptography with leakage and tamper resilience
- Impossibility on tamper-resilient cryptography with uniqueness properties
- Four-state non-malleable codes with explicit constant rate
- (Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
- Fully Leakage-Resilient Codes
- Public key encryption resilient to leakage and tampering attacks
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions
- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions
- Bounded tamper resilience: how to go beyond the algebraic barrier
- Non-malleable fuzzy extractors
- Non-malleable Codes with Split-State Refresh
- Non-malleable functions and their applications
This page was built for publication: Tamper detection and continuous non-malleable codes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5261640)