Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Cryptography Secure against Related-Key Attacks and Tampering - MaRDI portal

Cryptography Secure against Related-Key Attacks and Tampering

From MaRDI portal
Publication:3102205

DOI10.1007/978-3-642-25385-0_26zbMath1227.94028OpenAlexW2157980705MaRDI QIDQ3102205

Rachel Miller, David Cash, Mihir Bellare

Publication date: 2 December 2011

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-25385-0_26




Related Items (32)

Relations between robustness and RKA security under public-key encryptionNon-malleable functions and their applicationsPublic-Key Puncturable Encryption: Modular and Compact ConstructionsSuper-strong RKA secure MAC, PKE and SE from tag-based hash proof systemPublic key encryption resilient to leakage and tampering attacksPublic-key encryption for protecting data in cloud system with intelligent agents against side-channel attacksEfficient RKA-Secure KEM and IBE Schemes Against Invertible FunctionsSecure Message Authentication Against Related-Key AttackThe Chaining Lemma and Its ApplicationKey-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeEfficient Public-Key Cryptography with Bounded Leakage and Tamper ResiliencePublic-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary FunctionsOn the related-key attack security of authenticated encryption schemesBeyond Uber: instantiating generic groups via PGGsPractical non-malleable codes from symmetric-key primitives in 2-split-state modelContinuously non-malleable codes against bounded-depth tamperingRobust digital signature revisitedContinuously non-malleable codes in the split-state modelHow to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key AttacksNetwork Coding Signature Schemes Against Related-Key Attacks in the Random Oracle ModelRelated-Key Almost Universal Hash Functions: Definitions, Constructions and ApplicationsSubversion-resilient signatures: definitions, constructions and applicationsBounded tamper resilience: how to go beyond the algebraic barrierRelated-key security for pseudorandom functions beyond the linear barrierNon-malleable Codes with Split-State RefreshFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsRelated-key secure key encapsulation from extended computational bilinear Diffie-HellmanEfficient Completely Non-Malleable and RKA Secure Public Key EncryptionsFuzzy Signatures: Relaxing Requirements and a New ConstructionImpossibility on tamper-resilient cryptography with uniqueness propertiesProvably-Secure Remote Memory Attestation for Heap Overflow ProtectionDon't tamper with dual system encryption. Beyond polynomial related-key security of IBE




This page was built for publication: Cryptography Secure against Related-Key Attacks and Tampering