Pages that link to "Item:Q5172757"
From MaRDI portal
The following pages link to On cryptography with auxiliary input (Q5172757):
Displaying 44 items.
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Better security for deterministic public-key encryption: the auxiliary-input setting (Q744600) (← links)
- Provably secure certificate-based encryption with leakage resilience (Q1698724) (← links)
- Leakage-resilient cryptography from puncturable primitives and obfuscation (Q1710617) (← links)
- Leakage-resilient ring signature schemes (Q1711836) (← links)
- Leakage resilient one-way functions: the auxiliary-input setting (Q1784737) (← links)
- New approach to practical leakage-resilient public-key cryptography (Q2023806) (← links)
- (In)security of ring-LWE under partial key exposure (Q2027270) (← links)
- Towards a ring analogue of the leftover hash lemma (Q2027271) (← links)
- Reusable fuzzy extractors for low-entropy distributions (Q2032056) (← links)
- The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free (Q2056741) (← links)
- Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks (Q2061928) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- Witness authenticating NIZKs and applications (Q2139626) (← links)
- \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption (Q2146096) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- Leakage-resilient biometric-based remote user authentication with fuzzy extractors (Q2304568) (← links)
- Leakage resilience from program obfuscation (Q2318088) (← links)
- Strongly leakage resilient authenticated key exchange, revisited (Q2334443) (← links)
- Fully leakage-resilient signatures (Q2392093) (← links)
- Public key encryption resilient to leakage and tampering attacks (Q2402358) (← links)
- Strong authenticated key exchange with auxiliary inputs (Q2402976) (← links)
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks (Q2403460) (← links)
- Solving the learning parity with noise's open question (Q2444770) (← links)
- Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy (Q2697881) (← links)
- Contention in Cryptoland: Obfuscation, Leakage and UCE (Q2799108) (← links)
- Point-Function Obfuscation: A Framework and Generic Constructions (Q2799109) (← links)
- Deterministic Public-Key Encryption Under Continual Leakage (Q2822678) (← links)
- Signatures Resilient to Uninvertible Leakage (Q2827729) (← links)
- Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN (Q2835589) (← links)
- Big-Key Symmetric Encryption: Resisting Key Exfiltration (Q2835594) (← links)
- On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages (Q2946470) (← links)
- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy (Q2947523) (← links)
- Leakage Resilience of the Blom’s Key Distribution Scheme (Q2948266) (← links)
- Towards Proofs of Ownership Beyond Bounded Leakage (Q2953871) (← links)
- Randomness Leakage in the KEM/DEM Framework (Q3092368) (← links)
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting (Q3179355) (← links)
- On Symmetric Encryption and Point Obfuscation (Q3408187) (← links)
- Leakage-Resilient Signatures (Q3408204) (← links)
- Public-Key Encryption Schemes with Auxiliary Inputs (Q3408205) (← links)
- Fully Homomorphic Encryption with Auxiliary Inputs (Q3454587) (← links)
- Cryptography without (Hardly Any) Secrets ? (Q3627445) (← links)
- On the Connection between Leakage Tolerance and Adaptive Security (Q4916027) (← links)