-
1
-
-
70350627587
-
-
Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, 5444, pp. 474-495. Springer, Heidelberg (2009)
-
Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474-495. Springer, Heidelberg (2009)
-
-
-
-
2
-
-
72449143900
-
-
Alwen, J., Dodis, Y., Wichs, D.: Public key cryptography in the bounded retrieval model and security against side-channel attacks. In: Halevi, S. (ed.) Crypto 2009. LNCS, 5677, pp. 1-17. Springer, Heidelberg (2009)
-
Alwen, J., Dodis, Y., Wichs, D.: Public key cryptography in the bounded retrieval model and security against side-channel attacks. In: Halevi, S. (ed.) Crypto 2009. LNCS, vol. 5677, pp. 1-17. Springer, Heidelberg (2009)
-
-
-
-
3
-
-
51849097235
-
Bug attacks
-
Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
-
Biham, E., Carmeli, Y., Shamir, A.: Bug attacks. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 221-240. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 221-240
-
-
Biham, E.1
Carmeli, Y.2
Shamir, A.3
-
4
-
-
18844454571
-
Remote timing attacks are practical
-
Boneh, D., Brumley, D.: Remote timing attacks are practical. Computer Networks 48(5), 701-716 (2005)
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 701-716
-
-
Boneh, D.1
Brumley, D.2
-
5
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
-
Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37-51. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
6
-
-
84948973494
-
Exposure-resilient functions and all-or-nothing transforms
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Canetti, R., Dodis, Y., Halevi, S., Kushilevitz, E., Sahai, A.: Exposure-resilient functions and all-or-nothing transforms. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 453-469. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 453-469
-
-
Canetti, R.1
Dodis, Y.2
Halevi, S.3
Kushilevitz, E.4
Sahai, A.5
-
7
-
-
84921068967
-
-
Cramer, R., Damg?ard, I.: Secure signature schemes based on interactive protocols. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, 963, pp. 297-310. Springer, Heidelberg (1995)
-
Cramer, R., Damg?ard, I.: Secure signature schemes based on interactive protocols. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 297-310. Springer, Heidelberg (1995)
-
-
-
-
8
-
-
84880875026
-
Robust noninteractive zero knowledge
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
De Santis, A., Di Crescenzo, G., Ostrovsky, R., Persiano, G., Sahai, A.: Robust noninteractive zero knowledge. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 566-598. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 566-598
-
-
De Santis, A.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
Sahai, A.5
-
9
-
-
70350674336
-
On cryptography with auxiliary input
-
ACM, New York
-
Dodis, Y., Kalai, Y., Lovett, S.: On cryptography with auxiliary input. In: 41st Annual ACM Symposium on Theory of Computing (STOC), pp. 621-630. ACM, New York (2009)
-
(2009)
41st Annual ACM Symposium on Theory of Computing (STOC)
, pp. 621-630
-
-
Dodis, Y.1
Kalai, Y.2
Lovett, S.3
-
11
-
-
57949107348
-
Leakage-resilient cryptography. In: 49th Annual Symposium on Foundations of Computer Science (FOCS)
-
Dziembowski, S., Pietrzak, K.: Leakage-resilient cryptography. In: 49th Annual Symposium on Foundations of Computer Science (FOCS), pp. 293-302. IEEE, Los Alamitos (2008), Full version: http://eprint.iacr.org/2008/240
-
IEEE, Los Alamitos (2008), Full version
, pp. 293-302
-
-
Dziembowski, S.1
Pietrzak, K.2
-
12
-
-
72449196006
-
-
Faust, S., Kiltz, E., Pietrzak, K., Rothblum, G.: Leakage-resilient signatures, http://eprint.iacr.org/2009/282
-
Leakage-resilient signatures
-
-
Faust, S.1
Kiltz, E.2
Pietrzak, K.3
Rothblum, G.4
-
13
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
-
Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
14
-
-
84944898222
-
-
Fischlin, M., Fischlin, R.: The representation problem based on factoring. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, 2271, pp. 96-113. Springer, Heidelberg (2002)
-
Fischlin, M., Fischlin, R.: The representation problem based on factoring. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 96-113. Springer, Heidelberg (2002)
-
-
-
-
15
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17(2), 281-308 (1988)
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
16
-
-
84947558992
-
A "paradoxical" indentity-based signature scheme resulting from zero-knowledge
-
Goldwasser, S, ed, CRYPTO 1988, Springer, Heidelberg
-
Guillou, L.C., Quisquater, J.-J.: A "paradoxical" indentity-based signature scheme resulting from zero-knowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 216-231. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.403
, pp. 216-231
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
17
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
USENIX Association
-
Halderman, A., Schoen, S., Heninger, N., Clarkson, W., Paul, W., Calandrino, J., Feldman, A., Applebaum, J., Felten, E.: Lest we remember: Cold boot attacks on encryption keys. In: Proc. 17th USENIX Security Symposium, pp. 45-60. USENIX Association (2008)
-
(2008)
Proc. 17th USENIX Security Symposium
, pp. 45-60
-
-
Halderman, A.1
Schoen, S.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.6
Feldman, A.7
Applebaum, J.8
Felten, E.9
-
18
-
-
33745848493
-
Finding collisions on a public road, or do secure hash functions need secret coins?
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Hsiao, C.-Y., Reyzin, L.: Finding collisions on a public road, or do secure hash functions need secret coins? In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 92-105. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 92-105
-
-
Hsiao, C.-Y.1
Reyzin, L.2
-
19
-
-
35248830337
-
Private circuits: Securing hardware against probing attacks
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Ishai, Y., Sahai, A., Wagner, D.: Private circuits: Securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463-481. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 463-481
-
-
Ishai, Y.1
Sahai, A.2
Wagner, D.3
-
20
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
21
-
-
84939573910
-
Differential power analysis
-
Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
-
Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
22
-
-
84957057937
-
Coding constructions for blacklisting problems without computational assumptions
-
Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
-
Kumar, R., Rajagopalan, S., Sahai, A.: Coding constructions for blacklisting problems without computational assumptions. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 609-623. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 609-623
-
-
Kumar, R.1
Rajagopalan, S.2
Sahai, A.3
-
23
-
-
0003605145
-
Constructing digital signatures from a one-way function
-
Technical Report SRI-CSL-98, SRI International Computer Science Laboratory October
-
Lamport, L.: Constructing digital signatures from a one-way function. Technical Report SRI-CSL-98, SRI International Computer Science Laboratory (October 1979)
-
(1979)
-
-
Lamport, L.1
-
24
-
-
40249114814
-
-
Lyubashevsky, V., Micciancio, D.: Asymptotically efficient lattice-based digital signatures. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 37-54. Springer, Heidelberg (2008)
-
Lyubashevsky, V., Micciancio, D.: Asymptotically efficient lattice-based digital signatures. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 37-54. Springer, Heidelberg (2008)
-
-
-
-
25
-
-
35048852134
-
-
Micali, S., Reyzin, L.: Physically observable cryptography. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 278-296. Springer, Heidelberg (2004)
-
Micali, S., Reyzin, L.: Physically observable cryptography. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 278-296. Springer, Heidelberg (2004)
-
-
-
-
26
-
-
70350303869
-
Public-key cryptosystems resilient to key leakage
-
Halevi, S, ed, CRYPTO 2009, Springer, Heidelberg
-
Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 18-35. Springer, Heidelberg (2009), http://eprint.iacr.org/2009/105
-
(2009)
LNCS
, vol.5677
, pp. 18-35
-
-
Naor, M.1
Segev, G.2
-
27
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
ACM Press, New York
-
Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: 21st Annual ACM Symposium on Theory of Computing (STOC), pp. 33-43. ACM Press, New York (1989)
-
(1989)
21st Annual ACM Symposium on Theory of Computing (STOC)
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
28
-
-
33746391879
-
The insecurity of the digital signature algorithm with partially known nonces
-
Nguyen, P.Q., Shparlinski, I.: The insecurity of the digital signature algorithm with partially known nonces. Journal of Cryptology 15(3), 151-176 (2002)
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 151-176
-
-
Nguyen, P.Q.1
Shparlinski, I.2
-
29
-
-
84875762817
-
Provably secure and practical identification schemes and corresponding signature schemes
-
Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
-
Okamoto, T.: Provably secure and practical identification schemes and corresponding signature schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31-53. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 31-53
-
-
Okamoto, T.1
-
30
-
-
33745972475
-
Fast signature generation with a Fiat-Shamir-like scheme
-
Damgård, I.B, ed, EUROCRYPT 1990, Springer, Heidelberg
-
Ong, H., Schnorr, C.-P.: Fast signature generation with a Fiat-Shamir-like scheme. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 432-440. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.473
, pp. 432-440
-
-
Ong, H.1
Schnorr, C.-P.2
-
31
-
-
67650675583
-
A leakage-resilient mode of operation
-
Joux, A, ed, EUROCRYPT 2009, Springer, Heidelberg
-
Pietrzak, K.: A leakage-resilient mode of operation. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 462-482. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 462-482
-
-
Pietrzak, K.1
-
32
-
-
49149086879
-
Explicit non-adaptive combinatorial group testing schemes
-
Aceto, L, Damgård, I, Goldberg, L.A, Halldórsson, M.M, Ingólfsdóttir, A, Walukiewicz, I, eds, ICALP 2008, Part I, Springer, Heidelberg
-
Porat, E., Rothschild, A.: Explicit non-adaptive combinatorial group testing schemes. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part I. LNCS, vol. 5125, pp. 748-759. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5125
, pp. 748-759
-
-
Porat, E.1
Rothschild, A.2
-
33
-
-
0033342534
-
Non-malleable non-interactive zero knowledge and adaptive chosenciphertext security
-
IEEE, Los Alamitos
-
Sahai, A.: Non-malleable non-interactive zero knowledge and adaptive chosenciphertext security. In: 40th Annual Symposium on Foundations of Computer Science (FOCS), pp. 543-553. IEEE, Los Alamitos (1999)
-
(1999)
40th Annual Symposium on Foundations of Computer Science (FOCS)
, pp. 543-553
-
-
Sahai, A.1
-
34
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Schnorr, C.-P.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239-252. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 239-252
-
-
Schnorr, C.-P.1
-
35
-
-
67650694228
-
A unified framework for the analysis of side-channel key recovery attacks
-
Joux, A, ed, EUROCRYPT 2009, Springer, Heidelberg
-
Standaert, F.-X., Malkin, T., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443-461. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 443-461
-
-
Standaert, F.-X.1
Malkin, T.2
Yung, M.3
|