Survey: Leakage Resilience and the Bounded Retrieval Model
From MaRDI portal
Publication:4931663
DOI10.1007/978-3-642-14496-7_1zbMath1282.94031OpenAlexW1525987514MaRDI QIDQ4931663
Daniel Wichs, Joël Alwen, Yevgeniy Dodis
Publication date: 29 September 2010
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-14496-7_1
Cryptography (94A60) Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02)
Related Items (13)
Structure-preserving signatures and commitments to group elements ⋮ Static-memory-hard functions, and modeling the cost of space vs. time ⋮ Leakage Resilient One-Way Functions: The Auxiliary-Input Setting ⋮ Regular lossy functions and their applications in leakage-resilient cryptography ⋮ Naor-Yung paradigm with shared randomness and applications ⋮ Anonymous and leakage resilient IBE and IPE ⋮ Efficient and Provable White-Box Primitives ⋮ The hunting of the SNARK ⋮ Provably secure certificate-based encryption with leakage resilience ⋮ Leakage resilient one-way functions: the auxiliary-input setting ⋮ Naor-Yung Paradigm with Shared Randomness and Applications ⋮ Certified Security Proofs of Cryptographic Protocols in the Computational Model: An Application to Intrusion Resilience ⋮ Big-Key Symmetric Encryption: Resisting Key Exfiltration
This page was built for publication: Survey: Leakage Resilience and the Bounded Retrieval Model