Theory of Cryptography

From MaRDI portal
Publication:5901777


DOI10.1007/b95566zbMath1197.94197MaRDI QIDQ5901777

Leonid Reyzin, Silvio Micali

Publication date: 14 May 2009

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b95566


94A60: Cryptography


Related Items

A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting, Interleaved Group Products, On the Connection between Leakage Tolerance and Adaptive Security, Witness Maps and Applications, Memory leakage-resilient secret sharing schemes, The Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise Appearance, Fully Leakage-Resilient Codes, On the local leakage resilience of linear secret sharing schemes, Unconditionally secure computation against low-complexity leakage, Constructing tree decompositions of graphs with bounded gonality, Correction to: ``Unconditionally secure computation against low-complexity leakage, Short leakage resilient and non-malleable secret sharing schemes, A modular approach to the incompressibility of block-cipher-based AEADs, Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model, Efficient leakage-resilient MACs without idealized assumptions, Instantiability of classical random-oracle-model encryption transforms, New bounds on the local leakage resilience of Shamir's secret sharing scheme, Unifying freedom and separation for tight probing-secure composition, Signature schemes secure against hard-to-invert leakage, Leakage-resilient cryptography from minimal assumptions, Security of message authentication codes in the presence of key-dependent messages, Secure computation without computers, On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives, Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model, Black-box constructions of signature schemes in the bounded leakage setting, Horizontal collision correlation attack on elliptic curves, Constructive and destructive use of compilers in elliptic curve cryptography, On the leakage-resilient key exchange, On the impossibility of cryptography with tamperable randomness, Provably secure certificate-based encryption with leakage resilience, Leakage-resilient cryptography from puncturable primitives and obfuscation, Leakage-resilient ring signature schemes, Unifying leakage models: from probing attacks to noisy leakage, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, Leakage resilient one-way functions: the auxiliary-input setting, Leakage-resilient group signature: definitions and constructions, Classical leakage resilience from fault-tolerant quantum computation, New approach to practical leakage-resilient public-key cryptography, The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free, Random probing security: verification, composition, expansion and new constructions, Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle, Leakage-resilient key exchange and two-seed extractors, Reverse firewalls for actively secure MPCs, Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions, Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version, \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption, Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience, A novel completeness test for leakage models and its application to side channel attacks and responsibly engineered simulators, Key-policy attribute-based encryption against continual auxiliary input leakage, Hierarchical attribute based encryption with continuous leakage-resilience, Leakage-resilient coin tossing, Post-challenge leakage in public-key encryption, Continuous leakage-resilient certificate-based encryption, Locally decodable and updatable non-malleable codes and their applications, Leakage-resilient biometric-based remote user authentication with fuzzy extractors, Leakage resilience from program obfuscation, Strongly leakage resilient authenticated key exchange, revisited, Fully leakage-resilient signatures, Public key encryption resilient to leakage and tampering attacks, Strong authenticated key exchange with auxiliary inputs, Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks, Anonymous and leakage resilient IBE and IPE, System-level non-interference of constant-time cryptography. I: Model, Threshold public key encryption scheme resilient against continual leakage without random oracles, Limits of a conjecture on a leakage-resilient cryptosystem, A unified approach to deterministic encryption: new constructions and a connection to computational entropy, Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks, Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice, Optimal Amplification of Noisy Leakages, Deterministic Public-Key Encryption Under Continual Leakage, On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages, Near Collision Attack on the Grain v1 Stream Cipher, Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy, Leakage Resilience of the Blom’s Key Distribution Scheme, A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model, Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF, Leakage-Resilient Coin Tossing, Certified Security Proofs of Cryptographic Protocols in the Computational Model: An Application to Intrusion Resilience, Leakage Resilient Strong Key-Insulated Signatures in Public Channel, Leakage Resilient One-Way Functions: The Auxiliary-Input Setting, On Symmetric Encryption and Point Obfuscation, Leakage-Resilient Signatures, Public-Key Encryption Schemes with Auxiliary Inputs, How to Compute in the Presence of Leakage, Fully Homomorphic Encryption with Auxiliary Inputs, A Leakage Resilient MAC, Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage, An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security, Private Circuits II: Keeping Secrets in Tamperable Circuits, Language Modeling and Encryption on Packet Switched Networks, One-Time Programs, Cryptography without (Hardly Any) Secrets ?, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, A Leakage-Resilient Mode of Operation