The following pages link to Theory of Cryptography (Q5898357):
Displayed 22 items.
- Leakage-resilient cryptography from minimal assumptions (Q315546) (← links)
- Bounded tamper resilience: how to go beyond the algebraic barrier (Q514469) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Static-memory-hard functions, and modeling the cost of space vs. time (Q1629397) (← links)
- Incompressible encodings (Q2096497) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- Incompressible cryptography (Q2170026) (← links)
- ABE with improved auxiliary input for big data security (Q2402348) (← links)
- Big-Key Symmetric Encryption: Resisting Key Exfiltration (Q2835594) (← links)
- Crypto Galore! (Q2908530) (← links)
- Leakage Resilience of the Blom’s Key Distribution Scheme (Q2948266) (← links)
- Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks (Q2958121) (← links)
- Bounded-Retrieval Model with Keys Derived from Private Data (Q2980861) (← links)
- Leakage-Resilient Signatures (Q3408204) (← links)
- Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation (Q3448807) (← links)
- One-Time Programs with Limited Memory (Q3454868) (← links)
- Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage (Q3460114) (← links)
- A Leakage-Resilient Mode of Operation (Q3627451) (← links)
- A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes (Q4931664) (← links)
- IBE with incompressible master secret and small identity secrets (Q6114253) (← links)
- Rate-1 incompressible encryption from standard assumptions (Q6114264) (← links)
- A modular approach to the incompressibility of block-cipher-based AEADs (Q6132427) (← links)