A formal treatment of end-to-end encrypted cloud storage
From MaRDI portal
Publication:6648201
Recommendations
Cites work
- scientific article; zbMATH DE number 2086716 (Why is no real title available?)
- A formal treatment of end-to-end encrypted cloud storage
- Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks
- Multi-instance security and its application to password-based cryptography
- OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks
- On the limitations of universally composable two-party computation without set-up assumptions
- Puncturable key wrapping and its applications
- Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
- Security analysis of the WhatsApp end-to-end encrypted backup protocol
- TOPPSS: cost-minimal password-protected secret sharing based on threshold OPRF
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- The hidden number problem with small unknown multipliers: cryptanalyzing MEGA in six queries and other applications
- Theory of Cryptography
- \textit{Caveat implementor!} Key recovery attacks on MEGA
Cited in
(2)
This page was built for publication: A formal treatment of end-to-end encrypted cloud storage
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6648201)