Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Public Key Encryption against Related Key Attacks - MaRDI portal

Public Key Encryption against Related Key Attacks

From MaRDI portal
Publication:2900222

DOI10.1007/978-3-642-30057-8_16zbMath1290.94138OpenAlexW92989823MaRDI QIDQ2900222

Hoeteck Wee

Publication date: 20 July 2012

Published in: Public Key Cryptography – PKC 2012 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-30057-8_16




Related Items (27)

Relations between robustness and RKA security under public-key encryptionNon-malleable functions and their applicationsSecurity Against Related Randomness Attacks via Reconstructive ExtractorsSuper-strong RKA secure MAC, PKE and SE from tag-based hash proof systemFaster Gaussian sampling for trapdoor lattices with arbitrary modulusPublic-key encryption for protecting data in cloud system with intelligent agents against side-channel attacksEfficient RKA-Secure KEM and IBE Schemes Against Invertible FunctionsThe Chaining Lemma and Its ApplicationEfficient Public-Key Cryptography with Bounded Leakage and Tamper ResiliencePublic-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary FunctionsSecure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementationA Generic Construction of Integrated Secure-Channel Free PEKS and PKEContinuously non-malleable codes against bounded-depth tamperingVerifiable functional encryption using Intel SGXAlgebraic manipulation detection codesHow to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key AttacksNetwork Coding Signature Schemes Against Related-Key Attacks in the Random Oracle ModelSubversion-resilient signatures: definitions, constructions and applicationsBounded tamper resilience: how to go beyond the algebraic barrierRelated-key security for pseudorandom functions beyond the linear barrierNon-malleable Codes with Split-State RefreshIdentity-based encryption with leakage-amplified chosen-ciphertext attacks securityAlgebraic manipulation detection codes via highly nonlinear functionsRelated-key secure key encapsulation from extended computational bilinear Diffie-HellmanEfficient Completely Non-Malleable and RKA Secure Public Key EncryptionsImpossibility on tamper-resilient cryptography with uniqueness propertiesProvably-Secure Remote Memory Attestation for Heap Overflow Protection




This page was built for publication: Public Key Encryption against Related Key Attacks