Signature schemes secure against hard-to-invert leakage
From MaRDI portal
Publication:290397
DOI10.1007/s00145-015-9197-1zbMath1355.94053OpenAlexW1998630298MaRDI QIDQ290397
Peter Sebastian Nordholt, Carmit Hazay, Jesper Buus Nielsen, Angela Zottarel, Sebastian Faust
Publication date: 1 June 2016
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-015-9197-1
Related Items (5)
A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model ⋮ A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting ⋮ Leakage-resilient ring signature schemes ⋮ Leakage-resilient group signature: definitions and constructions ⋮ Black-box constructions of signature schemes in the bounded leakage setting
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Leakage-Resilient Circuits without Computational Assumptions
- Identity-Based Encryption Resilient to Continual Auxiliary Leakage
- Achieving Leakage Resilience through Dual System Encryption
- Signatures Resilient to Continual Leakage on Memory and Computation
- Fully Leakage-Resilient Signatures
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-Resilient Signatures
- Public-Key Encryption Schemes with Auxiliary Inputs
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Trapdoors for hard lattices and new cryptographic constructions
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Circular-Secure Encryption from Decision Diffie-Hellman
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- A Leakage-Resilient Mode of Operation
- Signature Schemes with Bounded Leakage Resilience
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Leakage-Resilient Cryptography from Minimal Assumptions
- On cryptography with auxiliary input
- Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Public-Key Cryptosystems Resilient to Key Leakage
- On lattices, learning with errors, random linear codes, and cryptography
- Theory of Cryptography
This page was built for publication: Signature schemes secure against hard-to-invert leakage