Pages that link to "Item:Q2900222"
From MaRDI portal
The following pages link to Public Key Encryption against Related Key Attacks (Q2900222):
Displaying 30 items.
- Relations between robustness and RKA security under public-key encryption (Q266278) (← links)
- Bounded tamper resilience: how to go beyond the algebraic barrier (Q514469) (← links)
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system (Q1647557) (← links)
- Faster Gaussian sampling for trapdoor lattices with arbitrary modulus (Q1648788) (← links)
- Public-key encryption resistant to parameter subversion and its realization from efficiently-embeddable groups (Q1749287) (← links)
- Subversion-resilient signatures: definitions, constructions and applications (Q1989360) (← links)
- Related-key security for pseudorandom functions beyond the linear barrier (Q1994635) (← links)
- Algebraic manipulation detection codes via highly nonlinear functions (Q2040332) (← links)
- Impossibility on tamper-resilient cryptography with uniqueness properties (Q2061927) (← links)
- Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE (Q2096618) (← links)
- Non-malleable functions and their applications (Q2121503) (← links)
- Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation (Q2194864) (← links)
- Identity-based encryption with leakage-amplified chosen-ciphertext attacks security (Q2290636) (← links)
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman (Q2293251) (← links)
- Breaking the Shin-Shin-Rhee remotely keyed encryption schemes (Q2380081) (← links)
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks (Q2403460) (← links)
- Algebraic manipulation detection codes (Q2438532) (← links)
- Verifiable functional encryption using Intel SGX (Q2697922) (← links)
- Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions (Q2817809) (← links)
- Provably-Secure Remote Memory Attestation for Heap Overflow Protection (Q2827711) (← links)
- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions (Q2946437) (← links)
- The Chaining Lemma and Its Application (Q2947530) (← links)
- Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience (Q2958151) (← links)
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions (Q2958152) (← links)
- How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks (Q2980852) (← links)
- Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model (Q2988350) (← links)
- Security Against Related Randomness Attacks via Reconstructive Extractors (Q3460096) (← links)
- Non-malleable Codes with Split-State Refresh (Q5738791) (← links)
- A Generic Construction of Integrated Secure-Channel Free PEKS and PKE (Q6163653) (← links)
- Continuously non-malleable codes against bounded-depth tampering (Q6175984) (← links)