Pages that link to "Item:Q3650722"
From MaRDI portal
The following pages link to Signature Schemes with Bounded Leakage Resilience (Q3650722):
Displaying 14 items.
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- Leakage-resilient cryptography from minimal assumptions (Q315546) (← links)
- Security of message authentication codes in the presence of key-dependent messages (Q420612) (← links)
- Bounded tamper resilience: how to go beyond the algebraic barrier (Q514469) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Black-box constructions of signature schemes in the bounded leakage setting (Q781055) (← links)
- Identity-based broadcast encryption with continuous leakage resilience (Q781856) (← links)
- Regular lossy functions and their applications in leakage-resilient cryptography (Q1643156) (← links)
- On the leakage-resilient key exchange (Q1684049) (← links)
- Leakage-resilient ring signature schemes (Q1711836) (← links)
- On the tightness of forward-secure signature reductions (Q1715854) (← links)
- Unifying leakage models: from probing attacks to noisy leakage (Q1715856) (← links)
- Leakage resilient one-way functions: the auxiliary-input setting (Q1784737) (← links)
- CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not $$\mathtt {q}$$ -type) Assumptions (Q6488926) (← links)