More efficient public-key cryptography with leakage and tamper resilience
From MaRDI portal
Publication:6635891
DOI10.1007/978-3-031-57728-4_1MaRDI QIDQ6635891
Shengli Liu, Da-Wu Gu, Shuai Han
Publication date: 12 November 2024
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- More efficient digital signatures with tight multi-user security
- Public key encryption resilient to post-challenge leakage and tampering attacks
- Strong leakage and tamper-resilient PKE from refined hash proof system
- Public key encryption resilient to leakage and tampering attacks
- Tightly CCA-Secure Encryption Without Pairings
- An Algebraic Framework for Diffie-Hellman Assumptions
- Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Tamper and Leakage Resilience in the Split-State Model
- Quasi-Adaptive NIZK for Linear Subspaces Revisited
- The Kernel Matrix Diffie-Hellman Assumption
- Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- A Pseudorandom Generator from any One-way Function
- Cryptography with Tamperable and Leaky Memory
- Tamper Detection and Continuous Non-malleable Codes
- How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Continuous Non-malleable Codes
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
This page was built for publication: More efficient public-key cryptography with leakage and tamper resilience
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6635891)