Randomness Leakage in the KEM/DEM Framework
From MaRDI portal
Publication:3092368
DOI10.1007/978-3-642-24316-5_22zbMath1298.94099OpenAlexW118806374MaRDI QIDQ3092368
Keisuke Tanaka, Kenji Yasunaga, Hitoshi Namiki
Publication date: 16 September 2011
Published in: Provable Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-24316-5_22
Cites Work
- Unnamed Item
- After-the-Fact Leakage in Public-Key Encryption
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- How to Encrypt with a Malicious Random Number Generator
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Hedged Public-Key Encryption: How to Protect against Bad Randomness
- On cryptography with auxiliary input
- Public-Key Cryptosystems Resilient to Key Leakage
This page was built for publication: Randomness Leakage in the KEM/DEM Framework