Big-Key Symmetric Encryption: Resisting Key Exfiltration
From MaRDI portal
Publication:2835594
DOI10.1007/978-3-662-53018-4_14zbMath1379.94030OpenAlexW2487384095MaRDI QIDQ2835594
Mihir Bellare, Daniel M. Kane, Phillip Rogaway
Publication date: 30 November 2016
Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53018-4_14
Related Items (11)
Provable time-memory trade-offs: symmetric cryptography against memory-bounded adversaries ⋮ Static-memory-hard functions, and modeling the cost of space vs. time ⋮ Incompressible cryptography ⋮ Verifiable capacity-bound functions: a new primitive from Kolmogorov complexity. (Revisiting space-based security in the adaptive setting) ⋮ IBE with incompressible master secret and small identity secrets ⋮ Rate-1 incompressible encryption from standard assumptions ⋮ Efficient and Provable White-Box Primitives ⋮ A modular approach to the incompressibility of block-cipher-based AEADs ⋮ Speak much, remember little: cryptography in the bounded storage model, revisited ⋮ Big-Key Symmetric Encryption: Resisting Key Exfiltration ⋮ Incompressible encodings
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Conditionally-perfect secrecy and a provably-secure randomized cipher
- Optimal randomizer efficiency in the bounded-storage model
- Constructing locally computable extractors and cryptosystems in the bounded-storage model
- Randomness is linear in space
- On recycling the randomness of states in space bounded computation
- Big-Key Symmetric Encryption: Resisting Key Exfiltration
- Instantiating Random Oracles via UCEs
- Security of Symmetric Encryption against Mass Surveillance
- Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
- Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources
- After-the-Fact Leakage in Public-Key Encryption
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Public-Key Encryption in the Bounded-Retrieval Model
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
- A Leakage-Resilient Mode of Operation
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Everlasting security in the bounded storage model
- Survey: Leakage Resilience and the Bounded Retrieval Model
- On cryptography with auxiliary input
- Extracting Randomness via Repeated Condensing
- Financial Cryptography and Data Security
- Theory of Cryptography
- Theory of Cryptography
- Advances in Cryptology - ASIACRYPT 2003
This page was built for publication: Big-Key Symmetric Encryption: Resisting Key Exfiltration