Continuous Leakage Resilient Lossy Trapdoor Functions
暂无分享,去创建一个
[1] Moni Naor,et al. Public-Key Cryptosystems Resilient to Key Leakage , 2012, SIAM J. Comput..
[2] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[3] Rui Zhang,et al. Updatable Hash Proof System and Its Applications , 2015, ESORICS.
[4] Vinod Vaikuntanathan,et al. Simultaneous Hardcore Bits and Cryptography against Memory Attacks , 2009, TCC.
[5] Yael Tauman Kalai,et al. Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[6] Yi Mu,et al. Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage , 2016, ProvSec.
[7] Brent Waters,et al. Lossy trapdoor functions and their applications , 2008, SIAM J. Comput..
[8] Rafail Ostrovsky,et al. Circular-Secure Encryption from Decision Diffie-Hellman , 2008, CRYPTO.
[9] Kefei Chen,et al. Leakage-resilient lossy trapdoor functions and public-key encryption , 2013, AsiaPKC '13.
[10] Vinod Vaikuntanathan,et al. On Continual Leakage of Discrete Log Representations , 2013, IACR Cryptol. ePrint Arch..
[11] Yanqin Zhu,et al. Leakage-resilient identity-based encryption scheme , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.
[12] Serge Fehr,et al. On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles , 2008, CRYPTO.
[13] Eike Kiltz,et al. Leakage Resilient ElGamal Encryption , 2010, ASIACRYPT.
[14] Vipul Goyal,et al. Interactive Proofs under Continual Memory Leakage , 2014, CRYPTO.
[15] Mihir Bellare,et al. Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening , 2009, EUROCRYPT.
[16] Limin Shen,et al. Efficient leakage-resilient public key encryption from DDH assumption , 2013, Cluster Computing.
[17] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[18] Yael Tauman Kalai,et al. Multiparty computation secure against continual memory leakage , 2012, STOC '12.
[19] Allison Bishop,et al. Achieving Leakage Resilience through Dual System Encryption , 2011, TCC.
[20] Hoeteck Wee,et al. Dual Projective Hashing and Its Applications - Lossy Trapdoor Functions and More , 2012, EUROCRYPT.
[21] Yevgeniy Dodis,et al. Cryptography against Continuous Memory Attacks , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[22] Ryo Nishimaki,et al. Efficient Non-interactive Universally Composable String-Commitment Schemes , 2009, ProvSec.
[23] Yevgeniy Dodis,et al. Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model , 2009, CRYPTO.
[24] Zvika Brakerski,et al. Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back) , 2010, IACR Cryptol. ePrint Arch..
[25] Moni Naor,et al. Public-Key Encryption in the Bounded-Retrieval Model , 2010, EUROCRYPT.
[26] Brent Waters,et al. Deterministic Public-Key Encryption Under Continual Leakage , 2016, ACNS.
[27] Hovav Shacham,et al. Hedged Public-Key Encryption: How to Protect against Bad Randomness , 2009, ASIACRYPT.