Pages that link to "Item:Q3058682"
From MaRDI portal
The following pages link to Efficient Public-Key Cryptography in the Presence of Key Leakage (Q3058682):
Displaying 50 items.
- Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing (Q266836) (← links)
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- Tightly secure signatures and public-key encryption (Q300383) (← links)
- Leakage-resilient cryptography from minimal assumptions (Q315546) (← links)
- Bounded tamper resilience: how to go beyond the algebraic barrier (Q514469) (← links)
- An algebraic framework for Diffie-Hellman assumptions (Q514473) (← links)
- On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives (Q726335) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Regular lossy functions and their applications in leakage-resilient cryptography (Q1643156) (← links)
- On the impossibility of cryptography with tamperable randomness (Q1688399) (← links)
- Leakage-resilient cryptography from puncturable primitives and obfuscation (Q1710617) (← links)
- Leakage-resilient ring signature schemes (Q1711836) (← links)
- Leakage resilient one-way functions: the auxiliary-input setting (Q1784737) (← links)
- Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing (Q1998834) (← links)
- Leakage-resilient group signature: definitions and constructions (Q1999051) (← links)
- New approach to practical leakage-resilient public-key cryptography (Q2023806) (← links)
- (In)security of ring-LWE under partial key exposure (Q2027270) (← links)
- Towards a ring analogue of the leftover hash lemma (Q2027271) (← links)
- Novel generic construction of leakage-resilient PKE scheme with CCA security (Q2035456) (← links)
- The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free (Q2056741) (← links)
- Impossibility on tamper-resilient cryptography with uniqueness properties (Q2061927) (← links)
- Issuer-hiding attribute-based credentials (Q2149822) (← links)
- Continuously non-malleable secret sharing for general access structures (Q2175937) (← links)
- Continuously non-malleable codes in the split-state model (Q2210446) (← links)
- Leakage-resilient coin tossing (Q2251154) (← links)
- Post-challenge leakage in public-key encryption (Q2257289) (← links)
- Novel updatable identity-based hash proof system and its applications (Q2283028) (← links)
- Leakage resilience from program obfuscation (Q2318088) (← links)
- Continuous leakage-resilient identity-based encryption with leakage amplification (Q2324786) (← links)
- Structure-preserving public-key encryption with leakage-resilient CCA security (Q2330095) (← links)
- Strongly leakage resilient authenticated key exchange, revisited (Q2334443) (← links)
- Fully leakage-resilient signatures (Q2392093) (← links)
- Naor-Yung paradigm with shared randomness and applications (Q2401764) (← links)
- Public key encryption resilient to leakage and tampering attacks (Q2402358) (← links)
- Strong authenticated key exchange with auxiliary inputs (Q2402976) (← links)
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks (Q2403460) (← links)
- Anonymous and leakage resilient IBE and IPE (Q2407713) (← links)
- Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge (Q2416940) (← links)
- The generic construction of continuous leakage-resilient identity-based cryptosystems (Q2632014) (← links)
- Updatable all-but-one dual projective hashing and its applications (Q2673066) (← links)
- Public-key encryption scheme with optimal continuous leakage resilience (Q2680220) (← links)
- Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy (Q2697881) (← links)
- Updatable public key encryption in the standard model (Q2697895) (← links)
- Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice (Q2794525) (← links)
- Optimal Amplification of Noisy Leakages (Q2799099) (← links)
- Leakage-Resilient Functional Encryption via Pair Encodings (Q2817484) (← links)
- Deterministic Public-Key Encryption Under Continual Leakage (Q2822678) (← links)
- Naor-Yung Paradigm with Shared Randomness and Applications (Q2827710) (← links)
- Signatures Resilient to Uninvertible Leakage (Q2827729) (← links)
- Spooky Encryption and Its Applications (Q2829944) (← links)