Simulating Auxiliary Inputs, Revisited
From MaRDI portal
Publication:3179356
DOI10.1007/978-3-662-53641-4_7zbMath1369.94567arXiv1503.00484OpenAlexW2478529919MaRDI QIDQ3179356
Publication date: 21 December 2016
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1503.00484
stream ciphersboostingleakage-resilient cryptographycomputational indistinguishabilitysimulating auxiliary inputs
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Quick approximation to matrices and applications
- A Uniform Min-Max Theorem with Applications in Cryptography
- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
- Time Space Tradeoffs for Attacks against One-Way Functions and PRGs
- A Leakage-Resilient Mode of Operation
- Practical Leakage-Resilient Symmetric Cryptography
- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness
- From Weak to Strong Zero-Knowledge and Applications
- Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size
- Separating succinct non-interactive arguments from all falsifiable assumptions
- How to Fake Auxiliary Input
This page was built for publication: Simulating Auxiliary Inputs, Revisited