-
1
-
-
70350627587
-
Simultaneous hardcore bits and cryptography against memory attacks
-
TCC, ser. O. Reingold, Ed., Springer
-
A. Akavia, S. Goldwasser, and V. Vaikuntanathan, "Simultaneous hardcore bits and cryptography against memory attacks," in TCC, ser. Lecture Notes in Computer Science, O. Reingold, Ed., vol. 5444. Springer, 2009, pp. 474-495.
-
(2009)
Lecture Notes in Computer Science
, vol.5444
, pp. 474-495
-
-
Akavia, A.1
Goldwasser, S.2
Vaikuntanathan, V.3
-
2
-
-
77954650592
-
Public-key encryption in the bounded-retrieval model
-
EUROCRYPT, ser. H. Gilbert, Ed., Springer
-
J. Alwen, Y. Dodis, M. Naor, G. Segev, S. Walfish, and D. Wichs, "Public-key encryption in the bounded-retrieval model," in EUROCRYPT, ser. Lecture Notes in Computer Science, H. Gilbert, Ed., vol. 6110. Springer, 2010, pp. 113-134.
-
(2010)
Lecture Notes in Computer Science
, vol.6110
, pp. 113-134
-
-
Alwen, J.1
Dodis, Y.2
Naor, M.3
Segev, G.4
Walfish, S.5
Wichs, D.6
-
3
-
-
70350340328
-
Leakage-resilient public-key cryptography in the bounded-retrieval model
-
CRYPTO, ser. S. Halevi, Ed., Springer
-
J. Alwen, Y. Dodis, and D. Wichs, "Leakage-resilient public-key cryptography in the bounded-retrieval model," in CRYPTO, ser. Lecture Notes in Computer Science, S. Halevi, Ed., vol. 5677. Springer, 2009, pp. 36-54.
-
(2009)
Lecture Notes in Computer Science
, vol.5677
, pp. 36-54
-
-
Alwen, J.1
Dodis, Y.2
Wichs, D.3
-
5
-
-
35248851617
-
Correlation-resistant storage via keyword-searchable encryption
-
Archive, Report 2005/417
-
L. Ballard, M. Green, B. de Medeiros, and F. Monrose, "Correlation-resistant storage via keyword-searchable encryption," Cryptology ePrint Archive, Report 2005/417, 2005, http://eprint.iacr.org/.
-
(2005)
Cryptology
-
-
Ballard, L.1
Green, M.2
De Medeiros, B.3
Monrose, F.4
-
6
-
-
69949124606
-
Randomizable proofs and delegatable anonymous credentials
-
CRYPTO, ser. S. Halevi, Ed., Springer
-
M. Belenkiy, J. Camenisch, M. Chase, M. Kohlweiss, A. Lysyanskaya, and H. Shacham, "Randomizable proofs and delegatable anonymous credentials," in CRYPTO, ser. Lecture Notes in Computer Science, S. Halevi, Ed., vol. 5677. Springer, 2009, pp. 108-125.
-
(2009)
Lecture Notes in Computer Science
, vol.5677
, pp. 108-125
-
-
Belenkiy, M.1
Camenisch, J.2
Chase, M.3
Kohlweiss, M.4
Lysyanskaya, A.5
Shacham, H.6
-
7
-
-
0003153237
-
Non-interactive zero-knowledge and its applications
-
extended abstract
-
M. Blum, P. Feldman, and S. Micali, "Non-interactive zero-knowledge and its applications (extended abstract)," in STOC. ACM, 1988, pp. 103-112.
-
(1988)
STOC. ACM
, pp. 103-112
-
-
Blum, M.1
Feldman, P.2
Micali, S.3
-
8
-
-
0026383119
-
Noninteractive zero-knowledge
-
M. Blum, A. D. Santis, S. Micali, and G. Persiano, "Noninteractive zero-knowledge," SIAM J. Comput., vol. 20, no. 6, pp. 1084-1118, 1991.
-
(1991)
SIAM J. Comput.
, vol.20
, Issue.6
, pp. 1084-1118
-
-
Blum, M.1
Santis, A.D.2
Micali, S.3
Persiano, G.4
-
9
-
-
35048887476
-
Short group signatures
-
CRYPTO, ser. M. K. Franklin, Ed., Springer
-
D. Boneh, X. Boyen, and H. Shacham, "Short group signatures," in CRYPTO, ser. Lecture Notes in Computer Science, M. K. Franklin, Ed., vol. 3152. Springer, 2004, pp. 41-55.
-
(2004)
Lecture Notes in Computer Science
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
10
-
-
78751478860
-
Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage
-
full version
-
Z. Brakerski, Y. T. Kalai, J. Katz, and V. Vaikuntanathan, "Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage," FOCS, 2010, full version: http://eprint.iacr. org/2010/278.
-
(2010)
FOCS
-
-
Brakerski, Z.1
Kalai, Y.T.2
Katz, J.3
Vaikuntanathan, V.4
-
11
-
-
84948973494
-
Exposure-resilient functions and all-or-nothing transforms
-
EUROCRYPT, ser. B. Preneel, Ed., Springer
-
R. Canetti, Y. Dodis, S. Halevi, E. Kushilevitz, and A. Sahai, "Exposure-resilient functions and all-or-nothing transforms," in EUROCRYPT, ser. Lecture Notes in Computer Science, B. Preneel, Ed., vol. 1807. Springer, 2000, pp. 453-469.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 453-469
-
-
Canetti, R.1
Dodis, Y.2
Halevi, S.3
Kushilevitz, E.4
Sahai, A.5
-
12
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
CRYPTO, ser. H. Krawczyk, Ed., Springer
-
R. Cramer and V. Shoup, "A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack," in CRYPTO, ser. Lecture Notes in Computer Science, H. Krawczyk, Ed., vol. 1462. Springer, 1998, pp. 13-25.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
13
-
-
78751485079
-
Cryptography against continuous memory attacks
-
ePrint Archive, Report 2010/196
-
Y. Dodis, K. Haralambiev, A. López-Alt, and D. Wichs, "Cryptography against continuous memory attacks," Cryptology ePrint Archive, Report 2010/196, 2010.
-
(2010)
Cryptology
-
-
Dodis, Y.1
Haralambiev, K.2
López-Alt, A.3
Wichs, D.4
-
14
-
-
78650817944
-
Efficient public-key cryptography in the presence of key leakage
-
ePrint Archive, Report 2010/154
-
-, "Efficient public-key cryptography in the presence of key leakage," Cryptology ePrint Archive, Report 2010/154, 2010.
-
(2010)
Cryptology
-
-
Dodis, Y.1
Haralambiev, K.2
López-Alt, A.3
Wichs, D.4
-
15
-
-
85028450627
-
Non-malleable cryptography
-
D. Dolev, C. Dwork, and M. Naor, "Non-malleable cryptography," in STOC. ACM, 1991, pp. 542-552.
-
(1991)
STOC. ACM
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
16
-
-
57949107348
-
Leakage-resilient cryptography
-
IEEE Computer Society
-
S. Dziembowski and K. Pietrzak, "Leakage-resilient cryptography," in FOCS. IEEE Computer Society, 2008, pp. 293-302.
-
(2008)
FOCS
, pp. 293-302
-
-
Dziembowski, S.1
Pietrzak, K.2
-
17
-
-
77949631657
-
Leakage-resilient signatures
-
TCC, ser. D. Micciancio, Ed., Springer
-
S. Faust, E. Kiltz, K. Pietrzak, and G. N. Rothblum, "Leakage- resilient signatures," in TCC, ser. Lecture Notes in Computer Science, D. Micciancio, Ed., vol. 5978. Springer, 2010, pp. 343-360.
-
(2010)
Lecture Notes in Computer Science
, vol.5978
, pp. 343-360
-
-
Faust, S.1
Kiltz, E.2
Pietrzak, K.3
Rothblum, G.N.4
-
19
-
-
67650659194
-
Cryptography without (hardly any) secrets?
-
EUROCRYPT, ser. A. Joux, Ed., Springer
-
S. Goldwasser, "Cryptography without (hardly any) secrets ?" in EUROCRYPT, ser. Lecture Notes in Computer Science, A. Joux, Ed., vol. 5479. Springer, 2009, pp. 369-370.
-
(2009)
Lecture Notes in Computer Science
, vol.5479
, pp. 369-370
-
-
Goldwasser, S.1
-
20
-
-
78751471777
-
How to play mental solitaire under continuous side-channels: A completeness theorem using secure hardware
-
to Appear at
-
S. Goldwasser and G. N. Rothblum, "How to play mental solitaire under continuous side-channels: A completeness theorem using secure hardware," to Appear at CRYPTO 2010.
-
CRYPTO 2010
-
-
Goldwasser, S.1
Rothblum, G.N.2
-
21
-
-
44449140946
-
Efficient non-interactive proof systems for bilinear groups
-
EUROCRYPT, ser. N. P. Smart, Ed., Springer
-
J. Groth and A. Sahai, "Efficient non-interactive proof systems for bilinear groups," in EUROCRYPT, ser. Lecture Notes in Computer Science, N. P. Smart, Ed., vol. 4965. Springer, 2008, pp. 415-432.
-
(2008)
Lecture Notes in Computer Science
, vol.4965
, pp. 415-432
-
-
Groth, J.1
Sahai, A.2
-
22
-
-
70350336468
-
-
Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, ser. Springer
-
S. Halevi, Ed., Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, ser. Lecture Notes in Computer Science, vol. 5677. Springer, 2009.
-
Lecture Notes in Computer Science
, vol.5677
, pp. 2009
-
-
Halevi, S.1
-
23
-
-
38049165151
-
Secure hybrid encryption from weakened key encapsulation
-
CRYPTO, ser. A. Menezes, Ed., Springer
-
D. Hofheinz and E. Kiltz, "Secure hybrid encryption from weakened key encapsulation," in CRYPTO, ser. Lecture Notes in Computer Science, A. Menezes, Ed., vol. 4622. Springer, 2007, pp. 553-571.
-
(2007)
Lecture Notes in Computer Science
, vol.4622
, pp. 553-571
-
-
Hofheinz, D.1
Kiltz, E.2
-
24
-
-
35248830337
-
Private circuits: Securing hardware against probing attacks
-
CRYPTO, ser. D. Boneh, Ed., Springer
-
Y. Ishai, A. Sahai, and D. Wagner, "Private circuits: Securing hardware against probing attacks," in CRYPTO, ser. Lecture Notes in Computer Science, D. Boneh, Ed., vol. 2729. Springer, 2003, pp. 463-481.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 463-481
-
-
Ishai, Y.1
Sahai, A.2
Wagner, D.3
-
25
-
-
78751564095
-
-
Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, ser. Springer
-
A. Joux, Ed., Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, ser. Lecture Notes in Computer Science, vol. 5479. Springer, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5479
-
-
Joux, A.1
-
26
-
-
78751492311
-
Protecting cryptographic keys against continual leakage
-
to appear at
-
A. Juma and Y. Vahlis, "Protecting cryptographic keys against continual leakage," to appear at CRYPTO 2010.
-
CRYPTO 2010
-
-
Juma, A.1
Vahlis, Y.2
-
27
-
-
72449205531
-
Signature schemes with bounded leakage resilience
-
ASIACRYPT, ser. M. Matsui, Ed., Springer
-
J. Katz and V. Vaikuntanathan, "Signature schemes with bounded leakage resilience," in ASIACRYPT, ser. Lecture Notes in Computer Science, M. Matsui, Ed., vol. 5912. Springer, 2009, pp. 703-720.
-
(2009)
Lecture Notes in Computer Science
, vol.5912
, pp. 703-720
-
-
Katz, J.1
Vaikuntanathan, V.2
-
28
-
-
35048852134
-
Physically observable cryptography
-
TCC, ser. M. Naor, Ed., Springer
-
S. Micali and L. Reyzin, "Physically observable cryptography," in TCC, ser. Lecture Notes in Computer Science, M. Naor, Ed., vol. 2951. Springer, 2004, pp. 278-296.
-
(2004)
Lecture Notes in Computer Science
, vol.2951
, pp. 278-296
-
-
Micali, S.1
Reyzin, L.2
-
29
-
-
70350303869
-
Public-key cryptosystems resilient to key leakage
-
CRYPTO, ser. S. Halevi, Ed., Springer
-
M. Naor and G. Segev, "Public-key cryptosystems resilient to key leakage," in CRYPTO, ser. Lecture Notes in Computer Science, S. Halevi, Ed., vol. 5677. Springer, 2009, pp. 18-35.
-
(2009)
Lecture Notes in Computer Science
, vol.5677
, pp. 18-35
-
-
Naor, M.1
Segev, G.2
-
30
-
-
67650675583
-
A leakage-resilient mode of operation
-
EUROCRYPT, ser. A. Joux, Ed., Springer
-
K. Pietrzak, "A leakage-resilient mode of operation," in EUROCRYPT, ser. Lecture Notes in Computer Science, A. Joux, Ed., vol. 5479. Springer, 2009, pp. 462-482.
-
(2009)
Lecture Notes in Computer Science
, vol.5479
, pp. 462-482
-
-
Pietrzak, K.1
-
31
-
-
33745125579
-
Non-interactive zero-knowledge with preprocessing
-
CRYPTO, ser. S. Goldwasser, Ed., Springer
-
A. D. Santis, S. Micali, and G. Persiano, "Non-interactive zero-knowledge with preprocessing," in CRYPTO, ser. Lecture Notes in Computer Science, S. Goldwasser, Ed., vol. 403. Springer, 1988, pp. 269-282.
-
(1988)
Lecture Notes in Computer Science
, vol.403
, pp. 269-282
-
-
Santis, A.D.1
Micali, S.2
Persiano, G.3
-
32
-
-
33646718113
-
Authenticated id-based key exchange and remote log-in with simple token and pin number
-
ePrint Archive, Report 2002/164
-
M. Scott, "Authenticated id-based key exchange and remote log-in with simple token and pin number," Cryptology ePrint Archive, Report 2002/164, 2002.
-
(2002)
Cryptology
-
-
Scott, M.1
-
33
-
-
38049124394
-
A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants
-
ePrint Archive, Report 2007/074
-
H. Shacham, "A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants," Cryptology ePrint Archive, Report 2007/074, 2007.
-
(2007)
Cryptology
-
-
Shacham, H.1
-
34
-
-
23044474013
-
Evidence that xtr is more secure than super-singular elliptic curve cryptosystems
-
E. R. Verheul, "Evidence that xtr is more secure than super-singular elliptic curve cryptosystems," J. Cryptology, vol. 17, no. 4, pp. 277-296, 2004.
-
(2004)
J. Cryptology
, vol.17
, Issue.4
, pp. 277-296
-
-
Verheul, E.R.1
-
35
-
-
78751490148
-
-
personal Communication. April
-
B. Waters, personal Communication. April 2010.
-
(2010)
-
-
Waters, B.1
|