The following pages link to Leakage-Resilient Signatures (Q3408204):
Displaying 26 items.
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- Security of message authentication codes in the presence of key-dependent messages (Q420612) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- On the leakage-resilient key exchange (Q1684049) (← links)
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings (Q1752551) (← links)
- Leakage resilient one-way functions: the auxiliary-input setting (Q1784737) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- Continuous leakage-resilient identity-based encryption with leakage amplification (Q2324786) (← links)
- Fully leakage-resilient signatures (Q2392093) (← links)
- A unified approach to deterministic encryption: new constructions and a connection to computational entropy (Q2516532) (← links)
- Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks (Q2794524) (← links)
- Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice (Q2794525) (← links)
- Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience (Q3012821) (← links)
- Leakage Resilient Strong Key-Insulated Signatures in Public Channel (Q3103599) (← links)
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting (Q3179355) (← links)
- Leakage-Resilient Signatures (Q3408204) (← links)
- Public-Key Encryption Schemes with Auxiliary Inputs (Q3408205) (← links)
- Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation (Q3448807) (← links)
- How to Compute in the Presence of Leakage (Q3449567) (← links)
- Fully Homomorphic Encryption with Auxiliary Inputs (Q3454587) (← links)
- A Practical Leakage-Resilient Signature Scheme in the Generic Group Model (Q3455486) (← links)
- On the Connection between Leakage Tolerance and Adaptive Security (Q4916027) (← links)
- Witness Maps and Applications (Q5041158) (← links)
- Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity (Q5205023) (← links)
- Efficiently testable circuits without conductivity (Q6582213) (← links)