Securing Computation against Continuous Leakage

From MaRDI portal
Publication:3582748

DOI10.1007/978-3-642-14623-7_4zbMath1280.94062OpenAlexW2101248381MaRDI QIDQ3582748

Guy N. Rothblum

Publication date: 24 August 2010

Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_4




Related Items (20)

Efficient and secure big data storage system with leakage resilience in cloud computingHow to Compute in the Presence of LeakageThe generic construction of continuous leakage-resilient identity-based cryptosystemsImpossibility of Black-Box Simulation Against Leakage AttacksA group identification protocol with leakage resilience of secret sharing schemeUnifying leakage models: from probing attacks to noisy leakageCompositional Synthesis of Leakage Resilient ProgramsTamper-Proof Circuits: How to Trade Leakage for Tamper-ResiliencePost-challenge leakage in public-key encryptionClassical leakage resilience from fault-tolerant quantum computationNew approach to practical leakage-resilient public-key cryptographyEfficient Leakage Resilient Circuit CompilersLeakage-Resilient Cryptography over Large Finite Fields: Theory and PracticeUnconditionally secure computation against low-complexity leakageCorrection to: ``Unconditionally secure computation against low-complexity leakageLocally decodable and updatable non-malleable codes and their applicationsOn Constructing Homomorphic Encryption Schemes from Coding TheoryContinuous leakage-resilient identity-based encryption with leakage amplificationIdentity-based broadcast encryption with continuous leakage resilienceMode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle







This page was built for publication: Securing Computation against Continuous Leakage