How to leak on key updates
From MaRDI portal
Publication:5419143
DOI10.1145/1993636.1993732zbMath1288.94074OpenAlexW2009943525MaRDI QIDQ5419143
No author found.
Publication date: 5 June 2014
Published in: Proceedings of the forty-third annual ACM symposium on Theory of computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/1993636.1993732
Related Items (14)
How to Compute in the Presence of Leakage ⋮ Leakage-resilient cryptography from minimal assumptions ⋮ Fully leakage-resilient signatures ⋮ Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency ⋮ Enabling cloud storage auditing with key-exposure resilience under continual key-leakage ⋮ Anonymous and leakage resilient IBE and IPE ⋮ Leakage Resilience of the Blom’s Key Distribution Scheme ⋮ Threshold public key encryption scheme resilient against continual leakage without random oracles ⋮ Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation ⋮ (In)security of ring-LWE under partial key exposure ⋮ Towards a ring analogue of the leftover hash lemma ⋮ Deterministic Public-Key Encryption Under Continual Leakage ⋮ Leakage resilience from program obfuscation
This page was built for publication: How to leak on key updates