Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation
From MaRDI portal
Publication:3448807
DOI10.1007/978-3-662-47672-7_37zbMath1440.94049OpenAlexW2147702386MaRDI QIDQ3448807
Jesper Buus Nielsen, Antonio Faonio, Daniele Venturi
Publication date: 27 October 2015
Published in: Automata, Languages, and Programming (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-47672-7_37
Related Items (9)
Witness Maps and Applications ⋮ Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage ⋮ Naor-Yung paradigm with shared randomness and applications ⋮ Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience ⋮ Subversion-resilient signatures: definitions, constructions and applications ⋮ Predictable Arguments of Knowledge ⋮ Fully Leakage-Resilient Codes ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ Naor-Yung Paradigm with Shared Randomness and Applications
Cites Work
- Unnamed Item
- Unnamed Item
- On the Non-malleability of the Fiat-Shamir Transform
- Leakage-Tolerant Interactive Protocols
- Signatures Resilient to Continual Leakage on Memory and Computation
- Fully Leakage-Resilient Signatures
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-Resilient Signatures
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- How to Protect Yourself without Perfect Shredding
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Leakage-Resilient Storage
- Signature Schemes with Bounded Leakage Resilience
- On the Connection between Leakage Tolerance and Adaptive Security
- A Second Look at Fischlin’s Transformation
- Leakage-Resilient Zero Knowledge
- Leakage-Resilient Signatures with Graceful Degradation
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
- Automata, Languages and Programming
- On Forward-Secure Storage
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
- Theory of Cryptography
This page was built for publication: Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation