Pages that link to "Item:Q2867150"
From MaRDI portal
The following pages link to Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier (Q2867150):
Displaying 16 items.
- Bounded tamper resilience: how to go beyond the algebraic barrier (Q514469) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system (Q1647557) (← links)
- Subversion-resilient signatures: definitions, constructions and applications (Q1989360) (← links)
- Continuously non-malleable codes in the split-state model (Q2210446) (← links)
- Locally decodable and updatable non-malleable codes and their applications (Q2303459) (← links)
- Public key encryption resilient to leakage and tampering attacks (Q2402358) (← links)
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks (Q2403460) (← links)
- Anonymous and leakage resilient IBE and IPE (Q2407713) (← links)
- The Chaining Lemma and Its Application (Q2947530) (← links)
- Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience (Q2958151) (← links)
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions (Q2958152) (← links)
- Witness Maps and Applications (Q5041158) (← links)
- Non-malleable Codes with Split-State Refresh (Q5738791) (← links)
- Continuously non-malleable codes with split-state refresh (Q5915916) (← links)
- NIZK from SNARGs (Q6110372) (← links)