Fully Leakage-Resilient Codes
From MaRDI portal
Publication:5738793
DOI10.1007/978-3-662-54365-8_14zbMath1404.94066OpenAlexW2402350373MaRDI QIDQ5738793
Antonio Faonio, Jesper Buus Nielsen
Publication date: 13 June 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-54365-8_14
impossibilityleakage-resilient cryptographyfeasibility resultsfully-leakage resiliencesimulation-based definition
Related Items
Cites Work
- Unnamed Item
- Unnamed Item
- Leakage-resilient coin tossing
- Fully leakage-resilient signatures
- Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice
- On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
- Leakage-Tolerant Computation with Input-Independent Preprocessing
- Interactive Proofs under Continual Memory Leakage
- Leakage-Tolerant Interactive Protocols
- Tamper and Leakage Resilience in the Split-State Model
- A Tamper and Leakage Resilient von Neumann Architecture
- Signatures Resilient to Continual Leakage on Memory and Computation
- After-the-Fact Leakage in Public-Key Encryption
- Leakage-Resilient Cryptography from the Inner-Product Extractor
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Impossibility of Black-Box Simulation Against Leakage Attacks
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- Leakage-Resilient Storage
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Signature Schemes with Bounded Leakage Resilience
- Lapin: An Efficient Authentication Protocol Based on Ring-LPN
- On the Connection between Leakage Tolerance and Adaptive Security
- Leakage-Resilient Zero Knowledge
- Leakage-Resilient Non-malleable Codes
- Tamper Detection and Continuous Non-malleable Codes
- Leakage-Resilient Signatures with Graceful Degradation
- Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits
- Storing Secrets on Continually Leaky Devices
- Predictable Arguments of Knowledge
- On Extractability Obfuscation
- Achieving Constant Round Leakage-Resilient Zero-Knowledge
- Continuous Non-malleable Codes
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography