-
1
-
-
70350627587
-
Simultaneous hardcore bits and cryptography against memory attacks
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474-495. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 474-495
-
-
Akavia, A.1
Goldwasser, S.2
Vaikuntanathan, V.3
-
2
-
-
77954650592
-
Public-key encryption in the bounded-retrieval model
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Alwen, J., Dodis, Y., Naor, M., Segev, G., Walfish, S., Wichs, D.: Public-key encryption in the bounded-retrieval model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 113-134. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 113-134
-
-
Alwen, J.1
Dodis, Y.2
Naor, M.3
Segev, G.4
Walfish, S.5
Wichs, D.6
-
3
-
-
70350340328
-
Leakage-resilient public-key cryptography in the bounded-retrieval model
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Alwen, J., Dodis, Y., Wichs, D.: Leakage-resilient public-key cryptography in the bounded-retrieval model. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 36-54. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 36-54
-
-
Alwen, J.1
Dodis, Y.2
Wichs, D.3
-
4
-
-
70249129465
-
Scalable and efficient provable data possession
-
Ateniese, G., Di Pietro, R., Mancini, L., Tsudik, G.: Scalable and efficient provable data possession. In: SecureComm (2008)
-
(2008)
SecureComm
-
-
Ateniese, G.1
Di Pietro, R.2
Mancini, L.3
Tsudik, G.4
-
5
-
-
0036612020
-
Everlasting security in the bounded storage model
-
Aumann, Y., Ding, Y.Z., Rabin, M.O.: Everlasting security in the bounded storage model. IEEE Transactions on Information Theory 48(6) (2002)
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.6
-
-
Aumann, Y.1
Ding, Y.Z.2
Rabin, M.O.3
-
7
-
-
77957010426
-
Circular and leakage resilient public-key encryption under subgroup indistinguishability
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Brakerski, Z., Goldwasser, S.: Circular and leakage resilient public-key encryption under subgroup indistinguishability. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 1-20. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 1-20
-
-
Brakerski, Z.1
Goldwasser, S.2
-
8
-
-
79953173707
-
Cryptography resilient to continual memory leakage
-
Brakerski, Z., Tauman Kalai, Y., Katz, J., Vaikuntanathan, V.: Cryptography resilient to continual memory leakage. In: FOCS (2010)
-
(2010)
FOCS
-
-
Brakerski, Z.1
Tauman Kalai, Y.2
Katz, J.3
Vaikuntanathan, V.4
-
9
-
-
33749565828
-
Mitigating dictionary attacks on password-protected local storage
-
Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
-
Canetti, R., Halevi, S., Steiner, M.: Mitigating dictionary attacks on password-protected local storage. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 160-179. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 160-179
-
-
Canetti, R.1
Halevi, S.2
Steiner, M.3
-
10
-
-
38049016824
-
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Cash, D.M., Ding, Y.Z., Dodis, Y., Lee, W., Lipton, R.J., Walfish, S.: Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 479-498. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 479-498
-
-
Cash, D.M.1
Ding, Y.Z.2
Dodis, Y.3
Lee, W.4
Lipton, R.J.5
Walfish, S.6
-
11
-
-
33745629609
-
Perfectly secure password protocols in the bounded retrieval model
-
Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
-
Di Crescenzo, G., Lipton, R.J., Walfish, S.: Perfectly secure password protocols in the bounded retrieval model. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 225-244. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3876
, pp. 225-244
-
-
Di Crescenzo, G.1
Lipton, R.J.2
Walfish, S.3
-
12
-
-
77958056591
-
Leakage-resilient storage
-
Garay, J.A., De Prisco, R. (eds.) SCN 2010. Springer, Heidelberg
-
Davì, F., Dziembowski, S., Venturi, D.: Leakage-resilient storage. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 121-137. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6280
, pp. 121-137
-
-
Davì, F.1
Dziembowski, S.2
Venturi, D.3
-
13
-
-
77949580684
-
Public-key encryption schemes with auxiliary inputs
-
Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
-
Dodis, Y., Goldwasser, S., Tauman Kalai, Y., Peikert, C., Vaikuntanathan, V.: Public-key encryption schemes with auxiliary inputs. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 361-381. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5978
, pp. 361-381
-
-
Dodis, Y.1
Goldwasser, S.2
Tauman Kalai, Y.3
Peikert, C.4
Vaikuntanathan, V.5
-
14
-
-
78751485079
-
Cryptography against continuous memory attacks
-
Dodis, Y., Haralambiev, K., Lopez-Alt, A., Wichs, D.: Cryptography against continuous memory attacks. In: FOCS (2010)
-
(2010)
FOCS
-
-
Dodis, Y.1
Haralambiev, K.2
Lopez-Alt, A.3
Wichs, D.4
-
15
-
-
35248835679
-
On memory-bound functions for fighting spam
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Dwork, C., Goldberg, A., Naor, M.: On memory-bound functions for fighting spam. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 426-444. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 426-444
-
-
Dwork, C.1
Goldberg, A.2
Naor, M.3
-
16
-
-
33745136796
-
Pebbling and proofs of work
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Dwork, C., Naor, M., Wee, H.: Pebbling and proofs of work. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 37-54. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 37-54
-
-
Dwork, C.1
Naor, M.2
Wee, H.3
-
17
-
-
33745532541
-
Intrusion-resilience via the bounded-storage model
-
Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
-
Dziembowski, S.: Intrusion-resilience via the bounded-storage model. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 207-224. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3876
, pp. 207-224
-
-
Dziembowski, S.1
-
18
-
-
33749583877
-
On forward-secure storage
-
Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
-
Dziembowski, S.: On forward-secure storage. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 251-270. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 251-270
-
-
Dziembowski, S.1
-
19
-
-
79953207453
-
One-Time Computable Self-Erasing Functions
-
ePrint Archive
-
Dziembowski, S., Kazana, T., Wichs, D.: One-Time Computable Self-Erasing Functions (2010), Cryptology ePrint Archive
-
(2010)
Cryptology
-
-
Dziembowski, S.1
Kazana, T.2
Wichs, D.3
-
20
-
-
4344699394
-
Optimal randomizer efficiency in the bounded-storage model
-
Dziembowski, S., Maurer, U.M.: Optimal randomizer efficiency in the bounded-storage model. J. Cryptology 17(1) (2004)
-
(2004)
J. Cryptology
, vol.17
, Issue.1
-
-
Dziembowski, S.1
Maurer, U.M.2
-
21
-
-
46749096773
-
Intrusion-resilient secret sharing
-
Dziembowski, S., Pietrzak, K.: Intrusion-resilient secret sharing. In: FOCS (2007)
-
(2007)
FOCS
-
-
Dziembowski, S.1
Pietrzak, K.2
-
25
-
-
77949631657
-
Leakage-resilient signatures
-
Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
-
Faust, S., Kiltz, E., Pietrzak, K., Rothblum, G.N.: Leakage-resilient signatures. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 343-360. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5978
, pp. 343-360
-
-
Faust, S.1
Kiltz, E.2
Pietrzak, K.3
Rothblum, G.N.4
-
26
-
-
35048896529
-
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
-
Naor, M. (ed.) TCC 2004. Springer, Heidelberg
-
Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., Rabin, T.: Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 258-277. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2951
, pp. 258-277
-
-
Gennaro, R.1
Lysyanskaya, A.2
Malkin, T.3
Micali, S.4
Rabin, T.5
-
27
-
-
33746066725
-
Private Circuits II: Keeping Secrets in Tamperable Circuits
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
-
Ishai, Y., Prabhakaran, M., Sahai, A., Wagner, D.: Private Circuits II: Keeping Secrets in Tamperable Circuits. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 308-327. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 308-327
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
Wagner, D.4
-
28
-
-
35248830337
-
Private Circuits: Securing Hardware against Probing Attacks
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Ishai, Y., Sahai, A., Wagner, D.: Private Circuits: Securing Hardware against Probing Attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463-481. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 463-481
-
-
Ishai, Y.1
Sahai, A.2
Wagner, D.3
-
29
-
-
72449205531
-
Signature schemes with bounded leakage resilience
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Katz, J., Vaikuntanathan, V.: Signature schemes with bounded leakage resilience. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 703-720. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 703-720
-
-
Katz, J.1
Vaikuntanathan, V.2
-
30
-
-
77958074345
-
Algorithmic tamper-proof security under probing attacks
-
Garay, J.A., De Prisco, R. (eds.) SCN 2010. Springer, Heidelberg
-
Liu, F.-H., Lysyanskaya, A.: Algorithmic tamper-proof security under probing attacks. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 106-120. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6280
, pp. 106-120
-
-
Liu, F.-H.1
Lysyanskaya, A.2
-
31
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
Maurer, U.M.: Conditionally-perfect secrecy and a provably-secure randomized cipher. J. Cryptology 5(1) (1992)
-
(1992)
J. Cryptology
, vol.5
, Issue.1
-
-
Maurer, U.M.1
-
32
-
-
35048852134
-
Physically observable cryptography
-
Naor, M. (ed.) TCC 2004. Springer, Heidelberg
-
Micali, S., Reyzin, L.: Physically observable cryptography. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 278-296. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2951
, pp. 278-296
-
-
Micali, S.1
Reyzin, L.2
-
33
-
-
70350303869
-
Public-key cryptosystems resilient to key leakage
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 18-35. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 18-35
-
-
Naor, M.1
Segev, G.2
-
34
-
-
78049363496
-
Secure code update for embedded devices via proofs of secure erasure
-
Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. Springer, Heidelberg
-
Perito, D., Tsudik, G.: Secure code update for embedded devices via proofs of secure erasure. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 643-662. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6345
, pp. 643-662
-
-
Perito, D.1
Tsudik, G.2
-
35
-
-
67650675583
-
A leakage-resilient mode of operation
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Pietrzak, K.: A leakage-resilient mode of operation. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 462-482. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 462-482
-
-
Pietrzak, K.1
-
37
-
-
67650694228
-
A unified framework for the analysis of side-channel key recovery attacks
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Standaert, F.-X., Malkin, T., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443-461. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 443-461
-
-
Standaert, F.-X.1
Malkin, T.2
Yung, M.3
-
38
-
-
35248831179
-
Captcha: Using hard ai problems for security
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: Captcha: Using hard ai problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.J.3
Langford, J.4
|