Leakage-Resilient Storage
From MaRDI portal
Publication:3588335
DOI10.1007/978-3-642-15317-4_9zbMath1285.94053OpenAlexW1606216659MaRDI QIDQ3588335
Daniele Venturi, Stefan Dziembowski, Francesco Davì
Publication date: 10 September 2010
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-15317-4_9
Related Items (28)
Adaptive extractors and their application to leakage resilient secret sharing ⋮ Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation ⋮ How to Compute in the Presence of Leakage ⋮ Incompressible functions, relative-error extractors, and the power of nondeterministic reductions ⋮ Leakage Resilient One-Way Functions: The Auxiliary-Input Setting ⋮ Practical continuously non-malleable randomness encoders in the random oracle model ⋮ ZK-PCPs from leakage-resilient secret sharing ⋮ Naor-Yung paradigm with shared randomness and applications ⋮ Continuously non-malleable secret sharing for general access structures ⋮ Short leakage resilient and non-malleable secret sharing schemes ⋮ Strong continuous non-malleable encoding schemes with tamper-detection ⋮ Extractors: low entropy requirements colliding with non-malleability ⋮ Explicit non-malleable codes from bipartite graphs ⋮ New bounds on the local leakage resilience of Shamir's secret sharing scheme ⋮ Continuously non-malleable codes in the split-state model ⋮ Non-Malleable Codes from Additive Combinatorics ⋮ On the Connection between Leakage Tolerance and Adaptive Security ⋮ Post-challenge leakage in public-key encryption ⋮ Fully Leakage-Resilient Codes ⋮ Continuously non-malleable codes with split-state refresh ⋮ Efficient Leakage Resilient Circuit Compilers ⋮ Leakage resilient one-way functions: the auxiliary-input setting ⋮ On the local leakage resilience of linear secret sharing schemes ⋮ Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ Optimal Amplification of Noisy Leakages ⋮ The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free ⋮ Naor-Yung Paradigm with Shared Randomness and Applications
This page was built for publication: Leakage-Resilient Storage