Theory of Cryptography

From MaRDI portal
Publication:5898356

DOI10.1007/11681878zbMath1112.94010OpenAlexW3149533473WikidataQ57254512 ScholiaQ57254512MaRDI QIDQ5898356

Stefan Dziembowski

Publication date: 12 February 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11681878




Related Items (25)

Universally composable secure positioning in the bounded retrieval modelStatic-memory-hard functions, and modeling the cost of space vs. timeMind Your Coins: Fully Leakage-Resilient Signatures with Graceful DegradationOne-Time Programs with Limited MemoryLeakage-resilient cryptography from minimal assumptionsCrypto Galore!Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of StorageAdaptive-secure identity-based inner-product functional encryption and its leakage-resilienceIncompressible cryptographyLeakage Resilience of the Blom’s Key Distribution SchemeOn differential privacy and adaptive data analysis with bounded spaceIBE with incompressible master secret and small identity secretsRate-1 incompressible encryption from standard assumptionsTowards Practical Whitebox Cryptography: Optimizing Efficiency and Space HardnessEfficient and Provable White-Box PrimitivesA modular approach to the incompressibility of block-cipher-based AEADsBounded-Retrieval Model with Keys Derived from Private DataBounded tamper resilience: how to go beyond the algebraic barrierA Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage SchemesFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelA Leakage-Resilient Mode of OperationThe mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for freeCertified Security Proofs of Cryptographic Protocols in the Computational Model: An Application to Intrusion ResilienceBig-Key Symmetric Encryption: Resisting Key ExfiltrationIncompressible encodings






This page was built for publication: Theory of Cryptography