-
1
-
-
84947283407
-
From identification to signatures via the fiat-shamir transform: Minimizing assumptions for security and forward-security
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Abdalla, M., An, J.H., Bellare, M., Namprempre, C.: From identification to signatures via the fiat-shamir transform: Minimizing assumptions for security and forward-security. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 418-433. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 418-433
-
-
Abdalla, M.1
An, J.H.2
Bellare, M.3
Namprempre, C.4
-
2
-
-
78149232131
-
-
Alwen, J., Dodis, Y., Naor, M., Segev, G., Walfish, S., Wichs, D.: Public-key encryption in the bounded-retrival model (2009), http://eprint.iacr. org/2009/512
-
(2009)
Public-key Encryption in the Bounded-retrival Model
-
-
Alwen, J.1
Dodis, Y.2
Naor, M.3
Segev, G.4
Walfish, S.5
Wichs, D.6
-
3
-
-
0036612020
-
Everlasting security in the bounded storage model
-
DOI 10.1109/TIT.2002.1003845, PII S0018944802040178
-
Aumann, Y., Ding, Y.Z., Rabin, M.O.: Everlasting security in the bounded storage model. IEEE Transactions on Information Theory 48(6), 1668-1680 (2002) (Pubitemid 34763564)
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.6
, pp. 1668-1680
-
-
Aumann, Y.1
Ding, Y.Z.2
Rabin, M.O.3
-
4
-
-
70350340328
-
Leakage-resilient public-key cryptography in the bounded-retrieval model
-
Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. Springer, Heidelberg
-
Alwen, J., Dodis, Y., Wichs, D.: Leakage-resilient public-key cryptography in the bounded-retrieval model. In: Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. LNCS, vol. 5677, pp. 36-54. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 36-54
-
-
Alwen, J.1
Dodis, Y.2
Wichs, D.3
-
5
-
-
70350627587
-
Simultaneous hardcore bits and cryptography against memory attacks
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
-
-
Akavia, A.1
Goldwasser, S.2
Vaikuntanathan, V.3
-
7
-
-
0029405656
-
Generalized privacy amplification
-
Bennett, C.H., Brassard, G., Crépeau, C., Maurer, U.M.: Generalized privacy amplification. IEEE Transactions on Information Theory 41(6), 1915-1923 (1995)
-
(1995)
IEEE Transactions on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
8
-
-
0023985539
-
Privacy amplification by public discussion
-
Bennett, C.H., Brassard, G., Robert, J.-M.: Privacy amplification by public discussion. SIAM J. Comput. 17(2), 210-229 (1988)
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
9
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
(extended abstract). In: Fumy, W. (ed.) EUROCRYPT 1997. Springer, Heidelberg
-
Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults (extended abstract). In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37-51. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
10
-
-
0027741529
-
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
-
Bellovin, S.M., Merritt, M.: Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise. In: ACM Conference on Computer and Communications Security, pp. 244-250 (1993)
-
(1993)
ACM Conference on Computer and Communications Security
, pp. 244-250
-
-
Bellovin, S.M.1
Merritt, M.2
-
11
-
-
84937550984
-
Provably secure password-authenticated key exchange using diffie-hellman
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Boyko, V., MacKenzie, P.D., Patel, S.: Provably secure password-authenticated key exchange using diffie-hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 156-171. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.D.2
Patel, S.3
-
12
-
-
78149231337
-
-
CRYPTO 2003. Springer, Heidelberg
-
Boneh, D. (ed.): CRYPTO 2003. LNCS, vol. 2729. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
-
-
Boneh, D.1
-
13
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
14
-
-
77954406158
-
-
CRYPTO 1992. Springer, Heidelberg
-
Brickell, E.F. (ed.): CRYPTO 1992. LNCS, vol. 740. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
-
-
Brickell, E.F.1
-
16
-
-
38049016824
-
Intrusion-resilient key exchange in the bounded retrieval model
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Cash, D., Ding, Y.Z., Dodis, Y., Lee, W., Lipton, R.J., Walfish, S.: Intrusion-resilient key exchange in the bounded retrieval model. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 479-498. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 479-498
-
-
Cash, D.1
Ding, Y.Z.2
Dodis, Y.3
Lee, W.4
Lipton, R.J.5
Walfish, S.6
-
17
-
-
84948973494
-
Exposure-resilient functions and all-or-nothing transforms
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Canetti, R., Dodis, Y., Halevi, S., Kushilevitz, E., Sahai, A.: Exposure-resilient functions and all-or-nothing transforms. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 453-469. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 453-469
-
-
Canetti, R.1
Dodis, Y.2
Halevi, S.3
Kushilevitz, E.4
Sahai, A.5
-
18
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Desmedt, Y.G. (ed.) CRYPTO 1994. Springer, Heidelberg
-
Cramer, R., Damgård, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174-187. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
19
-
-
33745629609
-
-
Halevi, Rabin (eds.) [HR06]
-
Di Crescenzo, G., Lipton, R.J., Walfish, S.: Perfectly secure password protocols in the bounded retrieval model. In: Halevi, Rabin (eds.) [HR06], pp. 225-244 (2006)
-
(2006)
Perfectly Secure Password Protocols in the Bounded Retrieval Model
, pp. 225-244
-
-
Di Crescenzo, G.1
Lipton, R.J.2
Walfish, S.3
-
20
-
-
84947267092
-
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 45-64
-
-
Cramer, R.1
Shoup, V.2
-
21
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 33(1), 167-226 (2004)
-
(2004)
SIAM J. Comput.
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
22
-
-
72449154882
-
-
Dodis, Y., Goldwasser, S., Kalai, Y., Peikert, C., Vaikuntanathan, V.: Public-key encryption schemes with auxiliary inputs (2009)
-
(2009)
Public-key Encryption Schemes with Auxiliary Inputs
-
-
Dodis, Y.1
Goldwasser, S.2
Kalai, Y.3
Peikert, C.4
Vaikuntanathan, V.5
-
23
-
-
70350674336
-
On cryptography with auxiliary input
-
Dodis, Y., Kalai, Y.T., Lovett, S.: On cryptography with auxiliary input. In: STOC, pp. 621-630 (2009)
-
(2009)
STOC
, pp. 621-630
-
-
Dodis, Y.1
Kalai, Y.T.2
Lovett, S.3
-
24
-
-
33749541274
-
Robust fuzzy extractors and authenticated key agreement from close secrets
-
Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
-
Dodis, Y., Katz, J., Reyzin, L., Smith, A.: Robust fuzzy extractors and authenticated key agreement from close secrets. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 232-250. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 232-250
-
-
Dodis, Y.1
Katz, J.2
Reyzin, L.3
Smith, A.4
-
25
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97-139 (2008)
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
26
-
-
46749096773
-
Intrusion-resilient secret sharing
-
IEEE Computer Society, Los Alamitos
-
Dziembowski, S., Pietrzak, K.: Intrusion-resilient secret sharing. In: FOCS, pp. 227-237. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
FOCS
, pp. 227-237
-
-
Dziembowski, S.1
Pietrzak, K.2
-
27
-
-
57949107348
-
Leakage-resilient cryptography
-
IEEE Computer Society, Los Alamitos
-
Dziembowski, S., Pietrzak, K.: Leakage-resilient cryptography. In: FOCS, pp. 293-302. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
FOCS
, pp. 293-302
-
-
Dziembowski, S.1
Pietrzak, K.2
-
28
-
-
84945116168
-
On perfect and adaptive security in exposure-resilient cryptography
-
Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
-
Dodis, Y., Sahai, A., Smith, A.: On perfect and adaptive security in exposure-resilient cryptography. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 301-324. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 301-324
-
-
Dodis, Y.1
Sahai, A.2
Smith, A.3
-
29
-
-
70350700885
-
Non-malleable extractors and symmetric key cryptography from weak secrets
-
Full version
-
Dodis, Y., Wichs, D.: Non-malleable extractors and symmetric key cryptography from weak secrets. In: STOC (2009), Full version, http://eprint.iacr.org/2008/503
-
(2009)
STOC
-
-
Dodis, Y.1
Wichs, D.2
-
31
-
-
72449196006
-
-
Faust, S., Kiltz, E., Pietrzak, K., Rothblum, G.: Leakage-resilient signatures (2009), http://eprint.iacr.org/2009/282
-
(2009)
Leakage-resilient Signatures
-
-
Faust, S.1
Kiltz, E.2
Pietrzak, K.3
Rothblum, G.4
-
32
-
-
77949638234
-
Protecting circuits from computationally-bounded leakage
-
Faust, S., Reyzin, L., Tromer, E.: Protecting circuits from computationally-bounded leakage. Cryptology ePrint Archive, Report 2009/379 (2009), http://eprint.iacr.org/
-
(2009)
Cryptology ePrint Archive, Report 2009/379
-
-
Faust, S.1
Reyzin, L.2
Tromer, E.3
-
33
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Odlyzko, A.M. (ed.) CRYPTO 1986. Springer, Heidelberg
-
Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
34
-
-
84976826800
-
Zero Knowledge Proofs of Knowledge in Two Rounds
-
Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
-
Feige, U., Shamir, A.: Zero Knowledge Proofs of Knowledge in Two Rounds. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 526-544. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 526-544
-
-
Feige, U.1
Shamir, A.2
-
35
-
-
33745184723
-
Session-key generation using human passwords only
-
DOI 10.1007/s00145-006-0233-z
-
Goldreich, O., Lindell, Y.: Session-key generation using human passwords only. J. Cryptology 19(3), 241-340 (2006) (Pubitemid 43911784)
-
(2006)
Journal of Cryptology
, vol.19
, Issue.3
, pp. 241-340
-
-
Goldreich, O.1
Lindell, Y.2
-
36
-
-
35248862449
-
Electromagnetic analysis: Concrete results
-
Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. Springer, Heidelberg
-
Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: Concrete results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 251-261. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2162
, pp. 251-261
-
-
Gandolfi, K.1
Mourtel, C.2
Olivier, F.3
-
37
-
-
71149116146
-
Proofs that yield nothing but their validity for all languages in np have zero-knowledge proof systems
-
Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity for all languages in np have zero-knowledge proof systems. J. ACM 38(3), 691-729 (1991)
-
(1991)
J. ACM
, vol.38
, Issue.3
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
38
-
-
77954654893
-
-
TCC 2006. Springer, Heidelberg
-
Halevi, S., Rabin, T. (eds.): TCC 2006. LNCS, vol. 3876, pp. 1-20. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3876
, pp. 1-20
-
-
Halevi, S.1
Rabin, T.2
-
39
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
van Oorschot, P.C. (ed.) USENIX Association
-
Alex Halderman, J., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: Cold boot attacks on encryption keys. In: van Oorschot, P.C. (ed.) USENIX Security Symposium, pp. 45-60. USENIX Association (2008)
-
(2008)
USENIX Security Symposium
, pp. 45-60
-
-
Alex Halderman, J.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
40
-
-
33746066725
-
Private circuits ii: Keeping secrets in tamperable circuits
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
-
Ishai, Y., Prabhakaran, M., Sahai, A., Wagner, D.: Private circuits ii: Keeping secrets in tamperable circuits. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 308-327. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 308-327
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
Wagner, D.4
-
41
-
-
35248830337
-
-
Boneh [Bon03]
-
Ishai, Y., Sahai, A., Wagner, D.: Private circuits: Securing hardware against probing attacks. In: Boneh [Bon03], pp. 463-481 (2003)
-
(2003)
Private Circuits: Securing Hardware Against Probing Attacks
, pp. 463-481
-
-
Ishai, Y.1
Sahai, A.2
Wagner, D.3
-
42
-
-
78149236734
-
-
CRYPTO 1997. Springer, Heidelberg
-
Kaliski Jr., B.S. (ed.): CRYPTO 1997. LNCS, vol. 1294, pp. 1-15. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 1-15
-
-
Kaliski Jr., B.S.1
-
43
-
-
84939573910
-
-
Wiener [Wie99]
-
Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener [Wie99], pp. 388-397 (1999)
-
(1999)
Differential Power Analysis
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
44
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
-
Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
-
Kocher, P.C.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
45
-
-
84945132563
-
Efficient password-authenticated key exchange using human-memorable passwords
-
Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
-
Katz, J., Ostrovsky, R., Yung, M.: Efficient password-authenticated key exchange using human-memorable passwords. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 475-494. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
46
-
-
67650667958
-
A new randomness extraction paradigm for hybrid encryption
-
Ghilardi, S. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Kiltz, E., Pietrzak, K., Stam, M., Yung, M.: A new randomness extraction paradigm for hybrid encryption. In: Ghilardi, S. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 590-609. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 590-609
-
-
Kiltz, E.1
Pietrzak, K.2
Stam, M.3
Yung, M.4
-
47
-
-
67650671123
-
Key agreement from close secrets over unsecured channels
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg Full version
-
Kanukurthi, B., Reyzin, L.: Key agreement from close secrets over unsecured channels. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479. Springer, Heidelberg (2009), Full version, http://eprint.iacr.org/2008/494
-
(2009)
LNCS
, vol.5479
-
-
Kanukurthi, B.1
Reyzin, L.2
-
48
-
-
72449205531
-
Signature schemes with bounded leakage resilience
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Katz, J., Vaikuntanathan, V.: Signature schemes with bounded leakage resilience. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912. Springer, Heidelberg (2009), http://www.mit.edu/ vinodv/papers/asiacrypt09/KV-Sigs.pdf
-
(2009)
LNCS
, vol.5912
-
-
Katz, J.1
Vaikuntanathan, V.2
-
50
-
-
84937432504
-
Hyper-encryption against space-bounded adversaries from on-line strong extractors
-
Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
-
Lu, C.-J.: Hyper-encryption against space-bounded adversaries from on-line strong extractors. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 257-271. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 257-271
-
-
Lu, C.-J.1
-
51
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
Maurer, U.M.: Conditionally-perfect secrecy and a provably-secure randomized cipher. J. Cryptology 5(1), 53-66 (1992)
-
(1992)
J. Cryptology
, vol.5
, Issue.1
, pp. 53-66
-
-
Maurer, U.M.1
-
53
-
-
35048852134
-
Physically observable cryptography (extended abstract)
-
Naor, M. (ed.) TCC 2004. Springer, Heidelberg
-
Micali, S., Reyzin, L.: Physically observable cryptography (extended abstract). In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 278-296. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2951
, pp. 278-296
-
-
Micali, S.1
Reyzin, L.2
-
55
-
-
70350303869
-
Public-key cryptosystems resilient to key leakage
-
Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. Springer, Heidelberg
-
Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. LNCS, vol. 5677, pp. 18-35. Springer, Heidelberg (2009), http://eprint.iacr.org/2009/105
-
(2009)
LNCS
, vol.5677
, pp. 18-35
-
-
Naor, M.1
Segev, G.2
-
56
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
ACM, New York
-
Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: STOC, pp. 33-43. ACM, New York (1989)
-
(1989)
STOC
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
57
-
-
0030086632
-
Randomness is linear in space
-
Nisan, N., Zuckerman, D.: Randomness is linear in space. J. Comput. Syst. Sci. 52(1), 43-52 (1996)
-
(1996)
J. Comput. Syst. Sci.
, vol.52
, Issue.1
, pp. 43-52
-
-
Nisan, N.1
Zuckerman, D.2
-
59
-
-
67650675583
-
A leakage-resilient mode of operation
-
Cologne, Germany
-
Pietrzak, K.: A leakage-resilient mode of operation. In: Eurocrypt 2009, Cologne, Germany, pp. 462-482 (2009)
-
(2009)
Eurocrypt 2009
, pp. 462-482
-
-
Pietrzak, K.1
-
60
-
-
78650238574
-
Electromagnetic analysis (ema): Measures and counter-measures for smart cards
-
Attali, S., Jensen, T. (eds.) E-smart 2001. Springer, Heidelberg
-
Quisquater, J.-J., Samyde, D.: Electromagnetic analysis (ema): Measures and counter-measures for smart cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200-210. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2140
, pp. 200-210
-
-
Quisquater, J.-J.1
Samyde, D.2
-
61
-
-
33745571012
-
On lattices, learning with errors, random linear codes, and cryptography
-
Gabow, H.N., Fagin, R. (eds.) ACM, New York
-
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Gabow, H.N., Fagin, R. (eds.) STOC, pp. 84-93. ACM, New York (2005)
-
(2005)
STOC
, pp. 84-93
-
-
Regev, O.1
-
62
-
-
0025152622
-
One-way functions are necessary and sufficient for secure signatures
-
ACM, New York
-
Rompel, J.: One-way functions are necessary and sufficient for secure signatures. In: STOC, pp. 387-394. ACM, New York (1990)
-
(1990)
STOC
, pp. 387-394
-
-
Rompel, J.1
-
64
-
-
4344628859
-
Constructing locally computable extractors and cryptosystems in the bounded-storage model
-
Vadhan, S.P.: Constructing locally computable extractors and cryptosystems in the bounded-storage model. J. Cryptology 17(1), 43-77 (2004)
-
(2004)
J. Cryptology
, vol.17
, Issue.1
, pp. 43-77
-
-
Vadhan, S.P.1
-
65
-
-
78149257068
-
-
CRYPTO 1999. Springer, Heidelberg
-
Wiener, M. (ed.): CRYPTO 1999. LNCS, vol. 1666. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
-
-
Wiener, M.1
|