-
2
-
-
70350627587
-
Simultaneous hardcore bits and cryptography against memory attacks
-
Sixth Theory of Cryptography Conference - TCC 2007, ser. O. Reingold, Ed., Springer-Verlag
-
A. Akavia, S. Goldwasser, and V. Vaikuntanathan, "Simultaneous hardcore bits and cryptography against memory attacks,"in Sixth Theory of Cryptography Conference - TCC 2007, ser. Lecture Notes in Computer Science, O. Reingold, Ed., vol. 5444. Springer-Verlag, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5444
-
-
Akavia, A.1
Goldwasser, S.2
Vaikuntanathan, V.3
-
3
-
-
70350340328
-
Leakage-resilient public-key cryptography in the bounded-retrieval model
-
Advances in Cryptology - CRYPTO 2009, ser. S. Halevi, Ed., Springer-Verlag
-
J. Alwen, Y. Dodis, and D. Wichs, "Leakage-resilient public-key cryptography in the bounded-retrieval model," in Advances in Cryptology - CRYPTO 2009, ser. LNCS, S. Halevi, Ed., vol. 5677. Springer-Verlag, 2009, pp. 36-54.
-
(2009)
LNCS
, vol.5677
, pp. 36-54
-
-
Alwen, J.1
Dodis, Y.2
Wichs, D.3
-
4
-
-
78149275873
-
Survey: Leakage resilience and the bounded retrieval model
-
-, "Survey: Leakage resilience and the bounded retrieval model," in ICITS, 2009, pp. 1-18.
-
(2009)
ICITS
, pp. 1-18
-
-
Alwen, J.1
Dodis, Y.2
Wichs, D.3
-
5
-
-
35048887476
-
Short group signatures
-
D. Boneh, X. Boyen, and H. Shacham, "Short group signatures,"in CRYPTO, 2004, pp. 41-55.
-
(2004)
CRYPTO
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
6
-
-
78751478860
-
Overcomeing the hole in the bucket: Public-key cryptography against resilient to continual memory leakage
-
Las Vegas, NV, USA: IEEE, Oct. 23-26
-
Z. Brakerski, J. Katz, Y. Kalai, and V. Vaikuntanathan, "Overcomeing the hole in the bucket: Public-key cryptography against resilient to continual memory leakage," in FOCS. Las Vegas, NV, USA: IEEE, Oct. 23-26 2010, pp. 501-510.
-
(2010)
FOCS
, pp. 501-510
-
-
Brakerski, Z.1
Katz, J.2
Kalai, Y.3
Vaikuntanathan, V.4
-
7
-
-
77958056591
-
Leakage-resilient storage
-
SCN, ser. J. A. Garay and R. D. Prisco, Eds., Springer
-
F. Davì, S. Dziembowski, and D. Venturi, "Leakage-resilient storage," in SCN, ser. Lecture Notes in Computer Science, J. A. Garay and R. D. Prisco, Eds., vol. 6280. Springer, 2010, pp. 121-137.
-
(2010)
Lecture Notes in Computer Science
, vol.6280
, pp. 121-137
-
-
Davì, F.1
Dziembowski, S.2
Venturi, D.3
-
8
-
-
78751485079
-
Cryptography against continuous memory attacks
-
Las Vegas, NV, USA: IEEE, Oct. 23-26
-
Y. Dodis, K. Haralambiev, A. López-Alt, and D. Wichs, "Cryptography against continuous memory attacks," in FOCS. Las Vegas, NV, USA: IEEE, Oct. 23-26 2010, pp. 511-520.
-
(2010)
FOCS
, pp. 511-520
-
-
Dodis, Y.1
Haralambiev, K.2
López-Alt, A.3
Wichs, D.4
-
9
-
-
84863311631
-
Storing secrets on continually leaky devices
-
Y. Dodis, A. Lewko, B. Waters, and D. Wichs, "Storing secrets on continually leaky devices," Cryptology ePrint Archive, Report 2011/369, 2011, http://eprint.iacr.org/.
-
(2011)
Cryptology ePrint Archive, Report 2011/369
-
-
Dodis, Y.1
Lewko, A.2
Waters, B.3
Wichs, D.4
-
11
-
-
57949107348
-
Leakage-resilient cryptography
-
Philadelphia, PA, USA: IEEE Computer Society, Oct. 25-28
-
S. Dziembowski and K. Pietrzak, "Leakage-resilient cryptography,"in 49th Symposium on Foundations of Computer Science. Philadelphia, PA, USA: IEEE Computer Society, Oct. 25-28 2008, pp. 293-302.
-
(2008)
49th Symposium on Foundations of Computer Science
, pp. 293-302
-
-
Dziembowski, S.1
Pietrzak, K.2
-
12
-
-
77949609866
-
-
ECRYPT, last accessed: August 26, 2009.
-
ECRYPT, "Side channel cryptanalysis lounge," last accessed: August 26, 2009. http://www.emsec.rub.de/research/projects/sclounge/.
-
Side Channel Cryptanalysis Lounge
-
-
-
14
-
-
77957009399
-
Securing computation against continuous leakage
-
CRYPTO, ser. T. Rabin, Ed., Springer
-
S. Goldwasser and G. N. Rothblum, "Securing computation against continuous leakage," in CRYPTO, ser. Lecture Notes in Computer Science, T. Rabin, Ed., vol. 6223. Springer, 2010, pp. 59-79.
-
(2010)
Lecture Notes in Computer Science
, vol.6223
, pp. 59-79
-
-
Goldwasser, S.1
Rothblum, G.N.2
-
15
-
-
0000966673
-
Advances in Cryptology - CRYPTO 2009
-
ser. Springer-Verlag
-
S. Halevi, Ed., Advances in Cryptology - CRYPTO 2009, ser. LNCS, vol. 5677. Springer-Verlag, 2009.
-
(2009)
LNCS
, vol.5677
-
-
Halevi, S.1
-
16
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
CRYPTO, ser. D. Coppersmith, Ed., Springer-Verlag, 27-31 Aug.
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive secret sharing or: How to cope with perpetual leakage,"in CRYPTO, ser. LNCS, D. Coppersmith, Ed., vol. 963. Springer-Verlag, 27-31 Aug. 1995, pp. 339-352.
-
(1995)
LNCS
, vol.963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
17
-
-
38049165151
-
Secure hybrid encryption from weakened key encapsulation
-
D. Hofheinz and E. Kiltz, "Secure hybrid encryption from weakened key encapsulation," in CRYPTO, 2007, pp. 553-571.
-
(2007)
CRYPTO
, pp. 553-571
-
-
Hofheinz, D.1
Kiltz, E.2
-
19
-
-
77957002505
-
Protecting cryptographic keys against continual leakage
-
CRYPTO, ser. T. Rabin, Ed., Springer
-
A. Juma and Y. Vahlis, "Protecting cryptographic keys against continual leakage," in CRYPTO, ser. Lecture Notes in Computer Science, T. Rabin, Ed., vol. 6223. Springer, 2010, pp. 41-58.
-
(2010)
Lecture Notes in Computer Science
, vol.6223
, pp. 41-58
-
-
Juma, A.1
Vahlis, Y.2
-
20
-
-
72449205531
-
Signature schemes with bounded leakage resilience
-
Advances in Cryptology - ASIACRYPT 2009, ser. M. Matsui, Ed. Springer- Verlag, to Appear
-
J. Katz and V. Vaikuntanathan, "Signature schemes with bounded leakage resilience," in Advances in Cryptology - ASIACRYPT 2009, ser. LNCS, M. Matsui, Ed. Springer- Verlag, 2009, to Appear.
-
(2009)
LNCS
-
-
Katz, J.1
Vaikuntanathan, V.2
-
21
-
-
79959686827
-
How to leak on key updates
-
to Appear
-
A. B. Lewko, M. Lewko, and B. Waters, "How to leak on key updates," in STOC, 2011, to Appear.
-
(2011)
STOC
-
-
Lewko, A.B.1
Lewko, M.2
Waters, B.3
-
22
-
-
79953164949
-
Achieving leakage resilience through dual system encryption
-
A. B. Lewko, Y. Rouselakis, and B. Waters, "Achieving leakage resilience through dual system encryption," in TCC, 2011, pp. 70-88.
-
(2011)
TCC
, pp. 70-88
-
-
Lewko, A.B.1
Rouselakis, Y.2
Waters, B.3
-
23
-
-
35048852134
-
Physically observable cryptography
-
(extended abstract)in First Theory of Cryptography Conference - TCC 2004, ser. M. Naor, Ed., Springer-Verlag, Feb. 19-21
-
S. Micali and L. Reyzin, "Physically observable cryptography (extended abstract)," in First Theory of Cryptography Conference - TCC 2004, ser. LNCS, M. Naor, Ed., vol. 2951. Springer-Verlag, Feb. 19-21 2004, pp. 278-296.
-
(2004)
LNCS
, vol.2951
, pp. 278-296
-
-
Micali, S.1
Reyzin, L.2
-
24
-
-
70350303869
-
Public-key cryptosystems resilient to key leakage
-
Advances in Cryptology - CRYPTO 2009, ser. S. Halevi, Ed., Springer-Verlag
-
M. Naor and G. Segev, "Public-key cryptosystems resilient to key leakage," in Advances in Cryptology - CRYPTO 2009, ser. LNCS, S. Halevi, Ed., vol. 5677. Springer-Verlag, 2009, pp. 18-35.
-
(2009)
LNCS
, vol.5677
, pp. 18-35
-
-
Naor, M.1
Segev, G.2
-
25
-
-
84871584138
-
Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings
-
ser. Springer
-
T. Rabin, Ed., Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings, ser. Lecture Notes in Computer Science, vol. 6223. Springer, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6223
-
-
Rabin, T.1
-
26
-
-
78649291377
-
-
Reliable Computing Laboratory, Boston University, August 26
-
Reliable Computing Laboratory, Boston University, "Side channel attacks database," http://www.sidechannelattacks.com, last accessed: August 26, 2009.
-
(2009)
Side Channel Attacks Database
-
-
-
27
-
-
33646718113
-
Authenticated id-based key exchange and remote log-in with simple token and pin number
-
M. Scott, "Authenticated id-based key exchange and remote log-in with simple token and pin number," Cryptology ePrint Archive, Report 2002/164, 2002, http://eprint.iacr.org/.
-
(2002)
Cryptology ePrint Archive, Report 2002/164
-
-
Scott, M.1
-
28
-
-
38049124394
-
A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants
-
[Online]. Available
-
H. Shacham, "A cramer-shoup encryption scheme from the linear assumption and from progressively weaker linear variants," 2007, cryptology ePrint Archive, Report 2007/074. [Online]. Available: http://eprint.iacr.org/ 2007/074
-
(2007)
Cryptology ePrint Archive, Report 2007/074
-
-
Shacham, H.1
-
29
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
30
-
-
23044474013
-
Evidence that xtr is more secure than supersingular elliptic curve cryptosystems
-
E. R. Verheul, "Evidence that xtr is more secure than supersingular elliptic curve cryptosystems," J. Cryptology, vol. 17, no. 4, pp. 277-296, 2004.
-
(2004)
J. Cryptology
, vol.17
, Issue.4
, pp. 277-296
-
-
Verheul, E.R.1
|