Leakage-Resilient Storage

From MaRDI portal
Publication:3588335

DOI10.1007/978-3-642-15317-4_9zbMath1285.94053OpenAlexW1606216659MaRDI QIDQ3588335

Daniele Venturi, Stefan Dziembowski, Francesco Davì

Publication date: 10 September 2010

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-15317-4_9




Related Items (28)

Adaptive extractors and their application to leakage resilient secret sharingMind Your Coins: Fully Leakage-Resilient Signatures with Graceful DegradationHow to Compute in the Presence of LeakageIncompressible functions, relative-error extractors, and the power of nondeterministic reductionsLeakage Resilient One-Way Functions: The Auxiliary-Input SettingPractical continuously non-malleable randomness encoders in the random oracle modelZK-PCPs from leakage-resilient secret sharingNaor-Yung paradigm with shared randomness and applicationsContinuously non-malleable secret sharing for general access structuresShort leakage resilient and non-malleable secret sharing schemesStrong continuous non-malleable encoding schemes with tamper-detectionExtractors: low entropy requirements colliding with non-malleabilityExplicit non-malleable codes from bipartite graphsNew bounds on the local leakage resilience of Shamir's secret sharing schemeContinuously non-malleable codes in the split-state modelNon-Malleable Codes from Additive CombinatoricsOn the Connection between Leakage Tolerance and Adaptive SecurityPost-challenge leakage in public-key encryptionFully Leakage-Resilient CodesContinuously non-malleable codes with split-state refreshEfficient Leakage Resilient Circuit CompilersLeakage resilient one-way functions: the auxiliary-input settingOn the local leakage resilience of linear secret sharing schemesLeakage-Resilient Cryptography over Large Finite Fields: Theory and PracticeFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelOptimal Amplification of Noisy LeakagesThe mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for freeNaor-Yung Paradigm with Shared Randomness and Applications




This page was built for publication: Leakage-Resilient Storage