Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage
暂无分享,去创建一个
[1] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[2] Futai Zhang,et al. Leakage-resilient identity-based encryption scheme , 2013, Int. J. Grid Util. Comput..
[3] Feng Xia,et al. Special issue on energy-aware computing and communications , 2013, Cluster Computing.
[4] Limin Shen,et al. A New Variant of the Cramer-Shoup Leakage-Resilient Public Key Encryption , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.
[5] Serge Fehr,et al. On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles , 2008, CRYPTO.
[6] Vinod Vaikuntanathan,et al. On Continual Leakage of Discrete Log Representations , 2013, IACR Cryptol. ePrint Arch..
[7] Yael Tauman Kalai,et al. Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[8] Brent Waters,et al. Deterministic Public-Key Encryption Under Continual Leakage , 2016, ACNS.
[9] Brent Waters,et al. Lossy trapdoor functions and their applications , 2008, SIAM J. Comput..
[10] Kefei Chen,et al. Leakage-resilient lossy trapdoor functions and public-key encryption , 2013, AsiaPKC '13.
[11] Vinod Vaikuntanathan,et al. Simultaneous Hardcore Bits and Cryptography against Memory Attacks , 2009, TCC.
[12] Hoeteck Wee,et al. KDM-Security via Homomorphic Smooth Projective Hashing , 2016, Public Key Cryptography.
[13] Limin Shen,et al. Efficient leakage-resilient public key encryption from DDH assumption , 2013, Cluster Computing.
[14] Yevgeniy Dodis,et al. Cryptography against Continuous Memory Attacks , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[15] Moni Naor,et al. Public-Key Encryption in the Bounded-Retrieval Model , 2010, EUROCRYPT.
[16] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[17] Yevgeniy Dodis,et al. Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model , 2009, CRYPTO.
[18] Zvika Brakerski,et al. Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back) , 2010, IACR Cryptol. ePrint Arch..
[19] Moni Naor,et al. Public-Key Cryptosystems Resilient to Key Leakage , 2009, SIAM J. Comput..
[20] Rafail Ostrovsky,et al. Circular-Secure Encryption from Decision Diffie-Hellman , 2008, CRYPTO.