-
1
-
-
57849098189
-
Universal arguments and their applications
-
Barak, B., Goldreich, O.: Universal arguments and their applications. SIAM J. Comput. 38(5), 1661-1694 (2008)
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.5
, pp. 1661-1694
-
-
Barak, B.1
Goldreich, O.2
-
2
-
-
84983104598
-
On Defining Proofs of Knowledge
-
Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
-
Bellare, M., Goldreich, O.: On Defining Proofs of Knowledge. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 390-420. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 390-420
-
-
Bellare, M.1
Goldreich, O.2
-
4
-
-
84856494511
-
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
-
Bitansky, N., Canetti, R., Chiesa, A., Tromer, E.: From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In: ITCS, pp. 326-349 (2012)
-
(2012)
ITCS
, pp. 326-349
-
-
Bitansky, N.1
Canetti, R.2
Chiesa, A.3
Tromer, E.4
-
5
-
-
84858329133
-
Leakage-Tolerant Interactive Protocols
-
Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
-
Bitansky, N., Canetti, R., Halevi, S.: Leakage-Tolerant Interactive Protocols. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 266-284. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7194
, pp. 266-284
-
-
Bitansky, N.1
Canetti, R.2
Halevi, S.3
-
6
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136-145 (2001)
-
(2001)
FOCS
, pp. 136-145
-
-
Canetti, R.1
-
7
-
-
0029723583
-
Adaptively secure multi-party computation
-
Canetti, R., Feige, U., Goldreich, O., Naor, M.: Adaptively secure multi-party computation. In: STOC, pp. 639-648 (1996)
-
(1996)
STOC
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
8
-
-
77958056591
-
Leakage-Resilient Storage
-
Garay, J.A.,De Prisco, R. (eds.) SCN 2010. Springer, Heidelberg
-
Daví, F., Dziembowski, S., Venturi, D.: Leakage-Resilient Storage. In: Garay, J.A.,De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 121-137. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6280
, pp. 121-137
-
-
Daví, F.1
Dziembowski, S.2
Venturi, D.3
-
9
-
-
78650817944
-
Efficient Public-Key Cryptography in the Presence of Key Leakage
-
Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
-
Dodis, Y., Haralambiev, K., López-Alt, A., Wichs, D.: Efficient Public-Key Cryptography in the Presence of Key Leakage. In: Abe, M. (ed.) ASIACRYPT 2010.LNCS, vol. 6477, pp. 613-631. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6477
, pp. 613-631
-
-
Dodis, Y.1
Haralambiev, K.2
López-Alt, A.3
Wichs, D.4
-
10
-
-
70350674336
-
On cryptography with auxiliary input
-
Dodis, Y., Kalai, Y.T., Lovett, S.: On cryptography with auxiliary input. In: STOC, pp. 621-630 (2009)
-
(2009)
STOC
, pp. 621-630
-
-
Dodis, Y.1
Kalai, Y.T.2
Lovett, S.3
-
11
-
-
84863311631
-
Storing secrets on continually leaky devices
-
Dodis, Y., Lewko, A.B., Waters, B., Wichs, D.: Storing secrets on continually leaky devices. In: FOCS, pp. 688-697 (2011)
-
(2011)
FOCS
, pp. 688-697
-
-
Dodis, Y.1
Lewko, A.B.2
Waters, B.3
Wichs, D.4
-
12
-
-
82955173781
-
Leakage-Resilient Cryptography from the Inner-Product Extractor
-
Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg
-
Dziembowski, S., Faust, S.: Leakage-Resilient Cryptography from the Inner-Product Extractor. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 702-721. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7073
, pp. 702-721
-
-
Dziembowski, S.1
Faust, S.2
-
13
-
-
84858320781
-
Leakage-Resilient Circuits without Computational Assumptions
-
Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
-
Dziembowski, S., Faust, S.: Leakage-Resilient Circuits without Computational Assumptions. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 230-247. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7194
, pp. 230-247
-
-
Dziembowski, S.1
Faust, S.2
-
14
-
-
57949107348
-
Leakage-resilient cryptography
-
Dziembowski, S., Pietrzak, K.: Leakage-resilient cryptography. In: FOCS, pp. 293-302 (2008)
-
(2008)
FOCS
, pp. 293-302
-
-
Dziembowski, S.1
Pietrzak, K.2
-
15
-
-
77949631657
-
Leakage-Resilient Signatures
-
Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
-
Faust, S., Kiltz, E., Pietrzak, K., Rothblum, G.N.: Leakage-Resilient Signatures. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 343-360. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5978
, pp. 343-360
-
-
Faust, S.1
Kiltz, E.2
Pietrzak, K.3
Rothblum, G.N.4
-
16
-
-
77954640094
-
Protecting Circuits from Leakage: The Computationally-Bounded and Noisy Cases
-
Gilbert,H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Faust, S., Rabin, T., Reyzin, L., Tromer, E., Vaikuntanathan, V.: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases. In: Gilbert,H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 135-156. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 135-156
-
-
Faust, S.1
Rabin, T.2
Reyzin, L.3
Tromer, E.4
Vaikuntanathan, V.5
-
17
-
-
84990731886
-
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
-
Odlyzko, A.M. (ed.) CRYPTO 1986. Springer, Heidelberg
-
Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263,pp. 186-194. Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
18
-
-
80051976331
-
Leakage-Resilient Zero Knowledge
-
Rogaway, P.(ed.) CRYPTO 2011. Springer, Heidelberg
-
Garg, S., Jain, A., Sahai, A.: Leakage-Resilient Zero Knowledge. In: Rogaway, P.(ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 297-315. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 297-315
-
-
Garg, S.1
Jain, A.2
Sahai, A.3
-
19
-
-
79959724747
-
Separating succinct non-interactive arguments from all falsifiable assumptions
-
Gentry, C., Wichs, D.: Separating succinct non-interactive arguments from all falsifiable assumptions. In: STOC, pp. 99-108 (2011)
-
(2011)
STOC
, pp. 99-108
-
-
Gentry, C.1
Wichs, D.2
-
20
-
-
79953188688
-
After-the-Fact Leakage in Public-Key Encryption
-
Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
-
Halevi, S., Lin, H.: After-the-Fact Leakage in Public-Key Encryption. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 107-124. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6597
, pp. 107-124
-
-
Halevi, S.1
Lin, H.2
-
21
-
-
40249089887
-
On Seed-Incompressible Functions
-
Canetti,R. (ed.) TCC 2008. Springer, Heidelberg
-
Halevi, S., Myers, S., Rackoff, C.: On Seed-Incompressible Functions. In: Canetti,R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 19-36. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 19-36
-
-
Halevi, S.1
Myers, S.2
Rackoff, C.3
-
22
-
-
35248830337
-
Private Circuits: Securing Hardware against Probing Attacks
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Ishai, Y., Sahai, A.,Wagner, D.: Private Circuits: Securing Hardware against Probing Attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463-481. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 463-481
-
-
Ishai, Y.1
Sahai, A.2
Wagner, D.3
-
23
-
-
79953226987
-
Parallel Repetition for Leakage Resilience Amplification Revisited
-
Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
-
Jain, A., Pietrzak, K.: Parallel Repetition for Leakage Resilience Amplification Revisited. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 58-69. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6597
, pp. 58-69
-
-
Jain, A.1
Pietrzak, K.2
-
24
-
-
72449205531
-
Signature Schemes with Bounded Leakage Resilience
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Katz, J., Vaikuntanathan, V.: Signature Schemes with Bounded Leakage Resilience.In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 703-720. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 703-720
-
-
Katz, J.1
Vaikuntanathan, V.2
-
25
-
-
0026963441
-
A note on efficient zero-knowledge proofs and arguments
-
extended abstract
-
Kilian, J.: A note on efficient zero-knowledge proofs and arguments (extended abstract). In: STOC, pp. 723-732 (1992)
-
(1992)
STOC
, pp. 723-732
-
-
Kilian, J.1
-
26
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
-
Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp.104-113. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
27
-
-
84939573910
-
Differential Power Analysis
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
28
-
-
0034854953
-
Computationally sound proofs
-
Micali, S.: Computationally sound proofs. SIAM J. Comput. 30(4), 1253-1298 (2000)
-
(2000)
SIAM J. Comput.
, vol.30
, Issue.4
, pp. 1253-1298
-
-
Micali, S.1
-
29
-
-
35048852134
-
Physically Observable Cryptography
-
Extended Abstract Naor, M. (ed.) TCC 2004. Springer, Heidelberg
-
Micali, S., Reyzin, L.: Physically Observable Cryptography (Extended Abstract). In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 278-296. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2951
, pp. 278-296
-
-
Micali, S.1
Reyzin, L.2
-
31
-
-
84937420653
-
Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case
-
Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
-
Nielsen, J.B.: Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case. In: Yung, M. (ed.) CRYPTO 2002.LNCS, vol. 2442, pp. 111-126. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 111-126
-
-
Nielsen, J.B.1
-
32
-
-
67650675583
-
A Leakage-Resilient Mode of Operation
-
Joux, A. (ed.) EUROCRYPT2009. Springer, Heidelberg
-
Pietrzak, K.: A Leakage-Resilient Mode of Operation. In: Joux, A. (ed.) EUROCRYPT2009. LNCS, vol. 5479, pp. 462-482. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 462-482
-
-
Pietrzak, K.1
-
33
-
-
84855444381
-
Parallel repetition of computationally sound protocols revisited
-
Pietrzak, K., Wikstrom, D.: Parallel repetition of computationally sound protocols revisited. J. Cryptology 25 (1), 116-135 (2012)
-
(2012)
J. Cryptology
, vol.25
, Issue.1
, pp. 116-135
-
-
Pietrzak, K.1
Wikstrom, D.2
-
34
-
-
78650238574
-
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards
-
Attali, S., Jensen, T. (eds.) E-smart 2001. Springer, Heidelberg
-
Quisquater, J.-J., Samyde, D.: ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001.LNCS, vol. 2140, pp. 200-210. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2140
, pp. 200-210
-
-
Quisquater, J.-J.1
Samyde, D.2
-
35
-
-
84859959109
-
Quantum Proofs of Knowledge
-
Pointcheval, D., Johansson, T. (eds.)EUROCRYPT 2012. Springer, Heidelberg
-
Unruh, D.: Quantum Proofs of Knowledge. In: Pointcheval, D., Johansson, T. (eds.)EUROCRYPT 2012. LNCS, vol. 7237, pp. 135-152. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7237
, pp. 135-152
-
-
Unruh, D.1
-
36
-
-
26444588107
-
On Round-Efficient Argument Systems
-
Caires, L., Italiano, G.F.,Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. Springer, Heidelberg
-
Wee, H.: On Round-Efficient Argument Systems. In: Caires, L., Italiano, G.F.,Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp.140-152. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
, pp. 140-152
-
-
Wee, H.1
|