메뉴 건너뛰기




Volumn 6597 LNCS, Issue , 2011, Pages 107-124

After-the-fact leakage in public-key encryption

Author keywords

[No Author keywords available]

Indexed keywords

ENTROPY; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK SECURITY; SEMANTICS;

EID: 79953188688     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19571-6_8     Document Type: Conference Paper
Times cited : (68)

References (20)
  • 1
    • 70350627587 scopus 로고    scopus 로고
    • Simultaneous hardcore bits and cryptography against memory attacks
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474-495. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 474-495
    • Akavia, A.1    Goldwasser, S.2    Vaikuntanathan, V.3
  • 2
    • 33746365070 scopus 로고    scopus 로고
    • More on the sum-product phenomenon in prime fields and its applications
    • Bourgain, J.: More on the sum-product phenomenon in prime fields and its applications. International Journal of Number Theory 1, 1-32 (2005)
    • (2005) International Journal of Number Theory , vol.1 , pp. 1-32
    • Bourgain, J.1
  • 3
    • 78751478860 scopus 로고    scopus 로고
    • Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage
    • IEEE Computer Society, Las Vegas
    • Brakerski, Z., Kalai, Y.T., Katz, J., Vaikuntanathan, V.: Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage. In: FOCS 2010, pp. 501-510. IEEE Computer Society, Las Vegas (2010)
    • (2010) FOCS 2010 , pp. 501-510
    • Brakerski, Z.1    Kalai, Y.T.2    Katz, J.3    Vaikuntanathan, V.4
  • 4
    • 0022183152 scopus 로고
    • Unbiased bits from sources of weak randomness and probabilistic communication complexity
    • (extended abstract). IEEE, Los Alamitos
    • Chor, B., Goldreich, O.: Unbiased bits from sources of weak randomness and probabilistic communication complexity (extended abstract). In: FOCS 1985, pp. 429-442. IEEE, Los Alamitos (1985)
    • (1985) FOCS 1985 , pp. 429-442
    • Chor, B.1    Goldreich, O.2
  • 5
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • Preliminary version in CRYPTO 1998
    • Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing 33(1), 167-226 (2003); Preliminary version in CRYPTO 1998
    • (2003) SIAM Journal on Computing , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 6
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97-139 (2008)
    • (2008) SIAM J. Comput. , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 8
    • 46749096773 scopus 로고    scopus 로고
    • Intrusion-resilient secret sharing
    • Dziembowski, S., Pietrzak, K.: Intrusion-resilient secret sharing. In: FOCS, pp. 227-237 (2007)
    • (2007) FOCS , pp. 227-237
    • Dziembowski, S.1    Pietrzak, K.2
  • 9
    • 57949107348 scopus 로고    scopus 로고
    • Leakage-resilient cryptography
    • IEEE Computer Society, Los Alamitos
    • Dziembowski, S., Pietrzak, K.: Leakage-resilient cryptography. In: FOCS 2008, pp. 293-302. IEEE Computer Society, Los Alamitos (2008)
    • (2008) FOCS 2008 , pp. 293-302
    • Dziembowski, S.1    Pietrzak, K.2
  • 10
    • 77957009399 scopus 로고    scopus 로고
    • Securing computation against continuous leakage
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Goldwasser, S., Rothblum, G.N.: Securing computation against continuous leakage. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 59-79. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 59-79
    • Goldwasser, S.1    Rothblum, G.N.2
  • 12
    • 0345253860 scopus 로고    scopus 로고
    • A pseudorandom generator from any one-way function
    • Håstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM J. Comput. 28(4), 1364-1396 (1999)
    • (1999) SIAM J. Comput. , vol.28 , Issue.4 , pp. 1364-1396
    • Håstad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 13
    • 35248830337 scopus 로고    scopus 로고
    • Private circuits: Securing hardware against probing attacks
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Ishai, Y., Sahai, A., Wagner, D.: Private circuits: Securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463-481. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 463-481
    • Ishai, Y.1    Sahai, A.2    Wagner, D.3
  • 14
    • 77957002505 scopus 로고    scopus 로고
    • Protecting cryptographic keys against continual leakage
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Juma, A., Vahlis, Y.: Protecting cryptographic keys against continual leakage. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 41-58. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 41-58
    • Juma, A.1    Vahlis, Y.2
  • 15
    • 35048852134 scopus 로고    scopus 로고
    • Physically observable cryptography
    • Naor, M. (ed.) TCC 2004. Springer, Heidelberg
    • Micali, S., Reyzin, L.: Physically observable cryptography. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 278-296. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2951 , pp. 278-296
    • Micali, S.1    Reyzin, L.2
  • 16
    • 70350303869 scopus 로고    scopus 로고
    • Public-key cryptosystems resilient to key leakage
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 18-35. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 18-35
    • Naor, M.1    Segev, G.2
  • 18
    • 0030086632 scopus 로고    scopus 로고
    • Randomness is linear in space
    • Nisan, N., Zuckerman, D.: Randomness is linear in space. J. Comput. Syst. Sci. 52(1), 43-52 (1996)
    • (1996) J. Comput. Syst. Sci. , vol.52 , Issue.1 , pp. 43-52
    • Nisan, N.1    Zuckerman, D.2
  • 19
    • 0021469810 scopus 로고
    • Generating quasi-random sequences from semi-random sources
    • Santha, M., Vazirani, U.V.: Generating quasi-random sequences from semi-random sources. J. Comput. Syst. Sci. 33(1), 75-87 (1986)
    • (1986) J. Comput. Syst. Sci. , vol.33 , Issue.1 , pp. 75-87
    • Santha, M.1    Vazirani, U.V.2
  • 20
    • 51249175241 scopus 로고
    • Strong communication complexity or generating quasirandom sequences form two communicating semi-random sources
    • Vazirani, U.V.: Strong communication complexity or generating quasirandom sequences form two communicating semi-random sources. Combinatorica 7(4), 375-392 (1987)
    • (1987) Combinatorica , vol.7 , Issue.4 , pp. 375-392
    • Vazirani, U.V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.