Leakage Resilience of the Blom’s Key Distribution Scheme
From MaRDI portal
Publication:2948266
DOI10.1007/978-3-319-04268-8_13zbMath1395.94291OpenAlexW1417410630MaRDI QIDQ2948266
Stefan Dziembowski, Michał Jastrzȩbski
Publication date: 30 September 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-04268-8_13
Related Items
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Conditionally-perfect secrecy and a provably-secure randomized cipher
- Perfectly secure key distribution for dynamic conferences
- Leakage-Resilient Circuits without Computational Assumptions
- Distributed public key schemes secure against continual leakage
- Leakage Resilience of the Blom’s Key Distribution Scheme
- How to share a secret
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Leakage-Resilient Coin Tossing
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- Protecting Cryptographic Keys against Continual Leakage
- Private Circuits II: Keeping Secrets in Tamperable Circuits
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- A Leakage-Resilient Mode of Operation
- Signature Schemes with Bounded Leakage Resilience
- Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity
- Non-Malleable Codes
- On cryptography with auxiliary input
- Leakage-Resilient Zero Knowledge
- How to leak on key updates
- Advances in Cryptology - CRYPTO 2003
- On the Generic Insecurity of the Full Domain Hash
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
- Theory of Cryptography
- On lattices, learning with errors, random linear codes, and cryptography
- Theory of Cryptography
- Theory of Cryptography