Theory of Cryptography
From MaRDI portal
Publication:5898357
DOI10.1007/11681878zbMath1112.68047OpenAlexW3149533473WikidataQ57254512 ScholiaQ57254512MaRDI QIDQ5898357
Richard J. Lipton, Giovanni Di Crescenzo, Shabsi Walfish
Publication date: 12 February 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11681878
Related Items (22)
Static-memory-hard functions, and modeling the cost of space vs. time ⋮ Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation ⋮ One-Time Programs with Limited Memory ⋮ Leakage-resilient cryptography from minimal assumptions ⋮ Crypto Galore! ⋮ Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage ⋮ Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience ⋮ ABE with improved auxiliary input for big data security ⋮ Incompressible cryptography ⋮ Leakage Resilience of the Blom’s Key Distribution Scheme ⋮ IBE with incompressible master secret and small identity secrets ⋮ Rate-1 incompressible encryption from standard assumptions ⋮ Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks ⋮ A modular approach to the incompressibility of block-cipher-based AEADs ⋮ Bounded-Retrieval Model with Keys Derived from Private Data ⋮ Bounded tamper resilience: how to go beyond the algebraic barrier ⋮ A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ A Leakage-Resilient Mode of Operation ⋮ Big-Key Symmetric Encryption: Resisting Key Exfiltration ⋮ Leakage-Resilient Signatures ⋮ Incompressible encodings
This page was built for publication: Theory of Cryptography