On the leakage-resilient key exchange
From MaRDI portal
Publication:1684049
DOI10.1515/jmc-2016-0003zbMath1376.94023OpenAlexW2769755916MaRDI QIDQ1684049
Publication date: 4 December 2017
Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1515/jmc-2016-0003
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Efficient eCK-Secure Authenticated Key Exchange Protocols in the Standard Model
- Signatures Resilient to Continual Leakage on Memory and Computation
- After-the-Fact Leakage in Public-Key Encryption
- Leakage-Resilient Cryptography from the Inner-Product Extractor
- Leakage-Resilient Signatures
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange
- Stronger Security of Authenticated Key Exchange
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- A Leakage-Resilient Mode of Operation
- Verifiable Random Functions from Identity-Based Key Encapsulation
- A New Randomness Extraction Paradigm for Hybrid Encryption
- Signature Schemes with Bounded Leakage Resilience
- An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles
- New directions in cryptography
- Examining smart-card security under the threat of power analysis attacks
- Continuous After-the-Fact Leakage-Resilient Key Exchange
- Advances in Cryptology - EUROCRYPT 2004
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
This page was built for publication: On the leakage-resilient key exchange