New approach to practical leakage-resilient public-key cryptography
DOI10.1515/jmc-2019-0014zbMath1462.94032OpenAlexW2995232125MaRDI QIDQ2023806
Janaka Alawatugoda, C. Pandu Rangan, Suvradip Chakraborty
Publication date: 3 May 2021
Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1515/jmc-2019-0014
public-key cryptographyauthenticated key exchangenon-interactive key exchangeleakage-resilient cryptographylow-latency key exchange
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Applications to coding theory and cryptography of arithmetic geometry (14G50) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62)
Uses Software
Cites Work
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- Leakage-resilient non-interactive key exchange in the continuous-memory leakage setting
- OAEP reconsidered
- Randomness is linear in space
- Strong authenticated key exchange with auxiliary inputs
- Strongly Leakage-Resilient Authenticated Key Exchange
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- On Continual Leakage of Discrete Log Representations
- Leakage-Resilient Circuits without Computational Assumptions
- One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
- Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency
- Signatures Resilient to Continual Leakage on Memory and Computation
- After-the-Fact Leakage in Public-Key Encryption
- Leakage Resilient ElGamal Encryption
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting
- Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange
- Stronger Security of Authenticated Key Exchange
- Protecting Cryptographic Keys against Continual Leakage
- Securing Computation against Continuous Leakage
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Signature Schemes with Bounded Leakage Resilience
- New directions in cryptography
- Non-Interactive Key Exchange
- Continuous After-the-Fact Leakage-Resilient Key Exchange
- On cryptography with auxiliary input
- Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
- Automata, Languages and Programming
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
- Unnamed Item
This page was built for publication: New approach to practical leakage-resilient public-key cryptography