Theory of Cryptography
From MaRDI portal
Publication:5898356
DOI10.1007/11681878zbMath1112.94010OpenAlexW3149533473WikidataQ57254512 ScholiaQ57254512MaRDI QIDQ5898356
Publication date: 12 February 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11681878
Related Items (25)
Universally composable secure positioning in the bounded retrieval model ⋮ Static-memory-hard functions, and modeling the cost of space vs. time ⋮ Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation ⋮ One-Time Programs with Limited Memory ⋮ Leakage-resilient cryptography from minimal assumptions ⋮ Crypto Galore! ⋮ Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage ⋮ Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience ⋮ Incompressible cryptography ⋮ Leakage Resilience of the Blom’s Key Distribution Scheme ⋮ On differential privacy and adaptive data analysis with bounded space ⋮ IBE with incompressible master secret and small identity secrets ⋮ Rate-1 incompressible encryption from standard assumptions ⋮ Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness ⋮ Efficient and Provable White-Box Primitives ⋮ A modular approach to the incompressibility of block-cipher-based AEADs ⋮ Bounded-Retrieval Model with Keys Derived from Private Data ⋮ Bounded tamper resilience: how to go beyond the algebraic barrier ⋮ A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ A Leakage-Resilient Mode of Operation ⋮ The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free ⋮ Certified Security Proofs of Cryptographic Protocols in the Computational Model: An Application to Intrusion Resilience ⋮ Big-Key Symmetric Encryption: Resisting Key Exfiltration ⋮ Incompressible encodings
This page was built for publication: Theory of Cryptography