Pages that link to "Item:Q5415547"
From MaRDI portal
The following pages link to Multiparty computation secure against continual memory leakage (Q5415547):
Displaying 18 items.
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Provably secure certificate-based encryption with leakage resilience (Q1698724) (← links)
- Leakage resilient one-way functions: the auxiliary-input setting (Q1784737) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- Constant-round leakage-resilient zero-knowledge from collision resistance (Q2135523) (← links)
- Leakage-resilient coin tossing (Q2251154) (← links)
- Continuous leakage-resilient certificate-based encryption (Q2279532) (← links)
- Enabling cloud storage auditing with key-exposure resilience under continual key-leakage (Q2660966) (← links)
- Leakage-Resilient Functional Encryption via Pair Encodings (Q2817484) (← links)
- Deterministic Public-Key Encryption Under Continual Leakage (Q2822678) (← links)
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting (Q3179355) (← links)
- Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption (Q3194601) (← links)
- How to Compute in the Presence of Leakage (Q3449567) (← links)
- Memory leakage-resilient secret sharing schemes (Q5046490) (← links)
- From fairness to full security in multiparty computation (Q5916285) (← links)
- Unconditionally secure computation against low-complexity leakage (Q5918097) (← links)
- Correction to: ``Unconditionally secure computation against low-complexity leakage'' (Q5925544) (← links)
- Protecting distributed primitives against leakage: equivocal secret sharing and more (Q6639504) (← links)