Related randomness attacks for public key encryption
From MaRDI portal
Recommendations
- Related randomness security for public key encryption, revisited
- Security Against Related Randomness Attacks via Reconstructive Extractors
- Hedged public-key encryption: how to protect against bad randomness
- How to Encrypt with a Malicious Random Number Generator
- scientific article; zbMATH DE number 708821
Cited in
(15)- How to Encrypt with a Malicious Random Number Generator
- Related randomness security for public key encryption, revisited
- Public Key Perturbation of Randomized RSA Implementations
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Randomness Reuse: Extensions and Improvements
- Beyond Uber: instantiating generic groups via PGGs
- Security of public key encryption against resetting attacks
- Resettable public-key encryption: how to encrypt on a virtual machine
- scientific article; zbMATH DE number 2085420 (Why is no real title available?)
- Hedged nonce-based public-key encryption: adaptive security under randomness failures
- Random Forest profiling attack on advanced encryption standard
- Public Key Encryption against Related Key Attacks
- Hedged public-key encryption: how to protect against bad randomness
- Malware, encryption, and rerandomization -- everything Is under attack
- Security Against Related Randomness Attacks via Reconstructive Extractors
This page was built for publication: Related randomness attacks for public key encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5402988)