Theory of Cryptography

From MaRDI portal
Publication:5901776

DOI10.1007/b95566zbMath1197.94187OpenAlexW2498336418MaRDI QIDQ5901776

Silvio Micali, Tal Rabin, Anna Lysyanskaya, Rosario Gennaro, Tal Malkin

Publication date: 14 May 2009

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b95566




Related Items

Continuous NMC secure against permutations and overwrites, with applications to CCA secure commitmentsTowards a unified approach to black-box constructions of zero-knowledge proofsOne-Time Programs with Limited MemoryPractical continuously non-malleable randomness encoders in the random oracle modelSuper-strong RKA secure MAC, PKE and SE from tag-based hash proof systemPublic key encryption resilient to leakage and tampering attacksPublic-key encryption for protecting data in cloud system with intelligent agents against side-channel attacksEfficient RKA-Secure KEM and IBE Schemes Against Invertible FunctionsThe Chaining Lemma and Its ApplicationWeakening the Isolation Assumption of Tamper-Proof Hardware TokensLeakage Resilience of the Blom’s Key Distribution SchemeDetection of Algebraic Manipulation in the Presence of LeakageOn the impossibility of cryptography with tamperable randomnessPost-quantum simulatable extraction with minimal assumptions: black-box and constant-roundEfficient Public-Key Cryptography with Bounded Leakage and Tamper ResiliencePublic-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary FunctionsStrong continuous non-malleable encoding schemes with tamper-detectionContinuously non-malleable codes against bounded-depth tamperingTrojan-resilience without cryptographyNon-malleable encryption: simpler, shorter, strongerContinuously non-malleable codes in the split-state modelNon-Malleable Codes from Additive CombinatoricsTamper-Proof Circuits: How to Trade Leakage for Tamper-ResilienceSubversion-resilient signatures: definitions, constructions and applicationsBounded tamper resilience: how to go beyond the algebraic barrierSecure computation without computersTight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable CodesPrivate Circuits II: Keeping Secrets in Tamperable CircuitsTight upper and lower bounds for leakage-resilient, locally decodable and updatable non-malleable codesOne-Time ProgramsContinuously non-malleable codes with split-state refreshA Unified Framework for the Analysis of Side-Channel Key Recovery AttacksLocally decodable and updatable non-malleable codes and their applicationsSecurity of hedged Fiat-Shamir signatures under fault attacksImpossibility on tamper-resilient cryptography with uniqueness propertiesFounding Cryptography on Tamper-Proof Hardware TokensTruly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens