Leakage-resilient key exchange and two-seed extractors
From MaRDI portal
Publication:2096493
DOI10.1007/978-3-030-56784-2_14zbMath1503.94040OpenAlexW3037264547MaRDI QIDQ2096493
Fermi Ma, Daniel Wichs, Willy Quach, Xin Li
Publication date: 9 November 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56784-2_14
Cites Work
- Unnamed Item
- Quantum cryptography: public key distribution and coin tossing
- Advances in cryptology -- CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16--20, 2009. Proceedings
- Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15--17, 2009. Proceedings
- Multiparty protocols, pseudorandom generators for Logspace, and time- space trade-offs
- Advances in cryptology -- CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17--21, 2003. Proceedings
- Leakage-resilient non-interactive key exchange in the continuous-memory leakage setting
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
- Barriers in cryptography with weak, correlated and leaky sources
- Achieving Leakage Resilience through Dual System Encryption
- Three XOR-Lemmas — An Exposition
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Lossy trapdoor functions and their applications
- Public-Key Encryption in the Bounded-Retrieval Model
- On the (Im)Possibility of Key Dependent Encryption
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- A Leakage-Resilient Mode of Operation
- Privacy Amplification by Public Discussion
- Quasi‐random classes of hypergraphs
- Generalized privacy amplification
- Overcoming Weak Expectations
- Leftover Hash Lemma, Revisited
- Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
- Separating succinct non-interactive arguments from all falsifiable assumptions
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - CRYPTO 2003
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
This page was built for publication: Leakage-resilient key exchange and two-seed extractors