Securing Computation against Continuous Leakage
From MaRDI portal
Publication:3582748
DOI10.1007/978-3-642-14623-7_4zbMath1280.94062OpenAlexW2101248381MaRDI QIDQ3582748
Publication date: 24 August 2010
Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_4
Related Items (20)
Efficient and secure big data storage system with leakage resilience in cloud computing ⋮ How to Compute in the Presence of Leakage ⋮ The generic construction of continuous leakage-resilient identity-based cryptosystems ⋮ Impossibility of Black-Box Simulation Against Leakage Attacks ⋮ A group identification protocol with leakage resilience of secret sharing scheme ⋮ Unifying leakage models: from probing attacks to noisy leakage ⋮ Compositional Synthesis of Leakage Resilient Programs ⋮ Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience ⋮ Post-challenge leakage in public-key encryption ⋮ Classical leakage resilience from fault-tolerant quantum computation ⋮ New approach to practical leakage-resilient public-key cryptography ⋮ Efficient Leakage Resilient Circuit Compilers ⋮ Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice ⋮ Unconditionally secure computation against low-complexity leakage ⋮ Correction to: ``Unconditionally secure computation against low-complexity leakage ⋮ Locally decodable and updatable non-malleable codes and their applications ⋮ On Constructing Homomorphic Encryption Schemes from Coding Theory ⋮ Continuous leakage-resilient identity-based encryption with leakage amplification ⋮ Identity-based broadcast encryption with continuous leakage resilience ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
This page was built for publication: Securing Computation against Continuous Leakage