-
1
-
-
24944516264
-
Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of kurosawa-desmedt KEM
-
In: Cramer, R. (ed.), Springer, Heidelberg
-
Abe, M., Gennaro, R., Kurosawa, K., Shoup, V.: Tag-KEM/DEM: a new framework for hybrid encryption and a new analysis of kurosawa-desmedt KEM. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 128-146. Springer, Heidelberg (2005)
-
(2005)
EUROCRYPT 2005. LNCS
, vol.3494
, pp. 128-146
-
-
Abe, M.1
Gennaro, R.2
Kurosawa, K.3
Shoup, V.4
-
2
-
-
70350627587
-
Simultaneous hardcore bits and cryptography against memory attacks
-
In: Reingold, O. (ed.), Springer, Heidelberg
-
Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474-495. Springer, Heidelberg (2009)
-
(2009)
TCC 2009. LNCS
, vol.5444
, pp. 474-495
-
-
Akavia, A.1
Goldwasser, S.2
Vaikuntanathan, V.3
-
3
-
-
84958641478
-
Differential fault analysis of secret key cryptosystems
-
In: Kaliski Jr., B.S. (ed.), Springer, Heidelberg
-
Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513-525. Springer, Heidelberg (1997)
-
(1997)
CRYPTO 1997. LNCS
, vol.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
4
-
-
78751478860
-
Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage
-
IEEE
-
Brakerski, Z., Kalai, Y.T., Katz, J., Vaikuntanathan, V.: Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage. In: FOCS, pp. 501-510.EEE (2010)
-
(2010)
FOCS
, pp. 501-510
-
-
Brakerski, Z.1
Kalai, Y.T.2
Katz, J.3
Vaikuntanathan, V.4
-
5
-
-
85032541897
-
Remote timing attacks are practical
-
USENIX Association
-
Brumley, D., Boneh, D.: Remote timing attacks are practical. In: USENIX Security Symposium, p. 1. USENIX Association (2003)
-
(2003)
USENIX Security Symposium
-
-
Brumley, D.1
Boneh, D.2
-
6
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
In: Cachin, C., Camenisch, J.L. (eds.), Springer, Heidelberg
-
Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004. LNCS
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
7
-
-
84963650728
-
Universal classes of hash functions
-
ACM
-
Carter, J.L., Wegman, M.N.: Universal classes of hash functions. In: STOC, pp. 106-112. ACM (1977)
-
(1977)
STOC
, pp. 106-112
-
-
Carter, J.L.1
Wegman, M.N.2
-
8
-
-
84947267092
-
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
-
In: Knudsen, L.R. (ed.), Springer, Heidelberg
-
Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, p. 45. Springer, Heidelberg (2002)
-
(2002)
EUROCRYPT 2002. LNCS
, vol.2332
-
-
Cramer, R.1
Shoup, V.2
-
9
-
-
78751485079
-
Cryptography against continuous memory attacks
-
IEEE
-
Dodis, Y., Haralambiev, K., Lopez-Alt, A., Wichs, D.: Cryptography against continuous memory attacks. In: FOCS, pp. 511-520. IEEE (2010)
-
(2010)
FOCS
, pp. 511-520
-
-
Dodis, Y.1
Haralambiev, K.2
Lopez-Alt, A.3
Wichs, D.4
-
10
-
-
70350674336
-
On cryptography with auxiliary input
-
ACM
-
Dodis, Y., Kalai, Y.T., Lovett, S.: On cryptography with auxiliary input. In: STOC, pp. 621-630. ACM (2009)
-
(2009)
STOC
, pp. 621-630
-
-
Dodis, Y.1
Kalai, Y.T.2
Lovett, S.3
-
11
-
-
84863311631
-
Storing secrets on continually leaky devices
-
IEEE
-
Dodis, Y., Lewko, A., Waters, B., Wichs, D.: Storing secrets on continually leaky devices. In: FOCS, pp. 688-697. IEEE (2011)
-
(2011)
FOCS
, pp. 688-697
-
-
Dodis, Y.1
Lewko, A.2
Waters, B.3
Wichs, D.4
-
12
-
-
77956996186
-
Leakage-resilient pseudorandom functions and side-channel attacks on feistel networks
-
In: Rabin, T. (ed.), Springer, Heidelberg
-
Dodis, Y., Pietrzak, K.: Leakage-resilient pseudorandom functions and side-channel attacks on feistel networks. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 21-40. Springer, Heidelberg (2010)
-
(2010)
CRYPTO 2010. LNCS
, vol.6223
, pp. 21-40
-
-
Dodis, Y.1
Pietrzak, K.2
-
13
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
In: Cachin, C., Camenisch, J.L. (eds.), Springer, Heidelberg
-
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004. LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
14
-
-
57949107348
-
Leakage-resilient cryptography
-
IEEE
-
Dziembowski, S., Pietrzak, K.: Leakage-resilient cryptography. In: FOCS, pp. 293-302. IEEE (2008)
-
(2008)
FOCS
, pp. 293-302
-
-
Dziembowski, S.1
Pietrzak, K.2
-
15
-
-
35248830706
-
A framework for password-based authenticated key exchange
-
In: Biham, E. (ed.), Springer, Heidelberg
-
Gennaro, R., Lindell, Y.: A framework for password-based authenticated key exchange. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656. Springer, Heidelberg (2003)
-
(2003)
EUROCRYPT 2003. LNCS
, pp. 2656
-
-
Gennaro, R.1
Lindell, Y.2
-
16
-
-
44449140946
-
Efficient non-interactive proof systems for bilinear groups
-
In: Smart, N.P. (ed.), Springer, Heidelberg
-
Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415-432. Springer, Heidelberg (2008)
-
(2008)
EUROCRYPT 2008. LNCS
, vol.4965
, pp. 415-432
-
-
Groth, J.1
Sahai, A.2
-
17
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
USENIX Association
-
Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: cold boot attacks on encryption keys. In: USENIX Security Symposium, pp. 45-60. USENIX Association (2008)
-
(2008)
USENIX Security Symposium
, pp. 45-60
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
18
-
-
84883335633
-
Leakage-resilient cryptography from minimal assumptions
-
In: Johansson, T., Nguyen, P.Q. (eds.), Springer, Heidelberg
-
Hazay, C., López-Alt, A., Wee, H., Wichs, D.: Leakage-resilient cryptography from minimal assumptions. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 160-176. Springer, Heidelberg (2013)
-
(2013)
EUROCRYPT 2013. LNCS
, vol.7881
, pp. 160-176
-
-
Hazay, C.1
López-Alt, A.2
Wee, H.3
Wichs, D.4
-
19
-
-
84861715771
-
Extended-DDH and lossy trapdoor functions
-
In: Fischlin, M., Buchmann, J., Manulis, M. (eds.), Springer, Heidelberg
-
Hemenway, B., Ostrovsky, R.: Extended-DDH and lossy trapdoor functions. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 627-643. Springer, Heidelberg (2012)
-
(2012)
PKC 2012. LNCS
, vol.7293
, pp. 627-643
-
-
Hemenway, B.1
Ostrovsky, R.2
-
20
-
-
38049165151
-
Secure hybrid encryption from weakened key encapsulation
-
In: Menezes, A. (ed.), Springer, Heidelberg
-
Hofheinz, D., Kiltz, E.: Secure hybrid encryption from weakened key encapsulation. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 553-571. Springer, Heidelberg (2007)
-
(2007)
CRYPTO 2007. LNCS
, vol.4622
, pp. 553-571
-
-
Hofheinz, D.1
Kiltz, E.2
-
21
-
-
84939573910
-
Differential power analysis
-
In: Wiener, M. (ed.), Springer, Heidelberg
-
Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 388. Springer, Heidelberg (1999)
-
(1999)
CRYPTO 1999. LNCS
, vol.1666
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
22
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
In: Koblitz, N. (ed.), Springer, Heidelberg
-
Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
-
(1996)
CRYPTO 1996. LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
23
-
-
84951273220
-
Deterministic public-key encryption under continual leakage
-
Report 2014/780
-
Koppula, V., Pandey, O., Rouselakis, Y., Waters, B.: Deterministic public-key encryption under continual leakage. Cryptology ePrint Archive, Report 2014/780 (2014). http://eprint.iacr.org/
-
(2014)
Cryptology Eprint Archive
-
-
Koppula, V.1
Pandey, O.2
Rouselakis, Y.3
Waters, B.4
-
24
-
-
35048835796
-
A new paradigm of hybrid encryption scheme
-
In: Franklin, M. (ed.), Springer, Heidelberg
-
Kurosawa, K., Desmedt, Y.G.: A new paradigm of hybrid encryption scheme. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 426-442. Springer, Heidelberg (2004)
-
(2004)
CRYPTO 2004. LNCS
, vol.3152
, pp. 426-442
-
-
Kurosawa, K.1
Desmedt, Y.G.2
-
25
-
-
79959686827
-
How to leak on key updates
-
ACM
-
Lewko, A., Lewko, M., Waters, B.: How to leak on key updates. In: STOC, pp. 725-734. ACM (2011)
-
(2011)
STOC
, pp. 725-734
-
-
Lewko, A.1
Lewko, M.2
Waters, B.3
-
26
-
-
79953164949
-
Achieving leakage resilience through dual system encryption
-
In: Ishai, Y. (ed.), Springer, Heidelberg
-
Lewko, A., Rouselakis, Y., Waters, B.: Achieving leakage resilience through dual system encryption. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 70-88. Springer, Heidelberg (2011)
-
(2011)
TCC 2011. LNCS
, vol.6597
, pp. 70-88
-
-
Lewko, A.1
Rouselakis, Y.2
Waters, B.3
-
27
-
-
35048852134
-
Physically observable cryptography
-
In: Naor, M. (ed.), Springer, Heidelberg
-
Micali, S., Reyzin, L.: Physically observable cryptography. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 278-296. Springer, Heidelberg (2004)
-
(2004)
TCC 2004. LNCS
, vol.2951
, pp. 278-296
-
-
Micali, S.1
Reyzin, L.2
-
28
-
-
70350303869
-
Public-key cryptosystems resilient to key leakage
-
In: Halevi, S. (ed.), Springer, Heidelberg
-
Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 18-35. Springer, Heidelberg (2009)
-
(2009)
CRYPTO 2009. LNCS
, vol.5677
, pp. 18-35
-
-
Naor, M.1
Segev, G.2
-
29
-
-
0024983231
-
Public-key cryptosystems provably secure against chosen ciphertext attacks
-
ACM
-
Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: STOC, pp. 427-437. ACM (1990)
-
(1990)
STOC
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
30
-
-
3042545023
-
Power-analysis attack on an asic aes implementation
-
IEEE
-
Ors, S.B., Gurkaynak, F., Oswald, E., Preneel, B.: Power-analysis attack on an asic aes implementation. In: Information Technology: Coding and Computing, pp. 546-552. IEEE (2004)
-
(2004)
Information Technology: Coding and Computing
, pp. 546-552
-
-
Ors, S.B.1
Gurkaynak, F.2
Oswald, E.3
Preneel, B.4
-
31
-
-
67650675583
-
A leakage-resilient mode of operation
-
In: Joux, A. (ed.), Springer, Heidelberg
-
Pietrzak, K.: A leakage-resilient mode of operation. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 462-482. Springer, Heidelberg (2009)
-
(2009)
EUROCRYPT 2009. LNCS
, vol.5479
, pp. 462-482
-
-
Pietrzak, K.1
-
32
-
-
84892397038
-
Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter
-
In: Sako, K., Sarkar, P. (eds.), Springer, Heidelberg
-
Qin, B., Liu, S.: Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. LNCS, vol. 8270, pp. 381-400. Springer, Heidelberg (2013)
-
(2013)
ASIACRYPT 2013, Part II. LNCS
, vol.8270
, pp. 381-400
-
-
Qin, B.1
Liu, S.2
-
33
-
-
84958538094
-
Leakage-flexible CCA-secure public-key encryption: Simple construction and free of pairing
-
In: Krawczyk, H. (ed.), Springer, Heidelberg
-
Qin, B., Liu, S.: Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 19-36. Springer, Heidelberg (2014)
-
(2014)
PKC 2014. LNCS
, vol.8383
, pp. 19-36
-
-
Qin, B.1
Liu, S.2
-
34
-
-
78650238574
-
ElectroMagnetic Analysis (EMA): Measures and counter-measures for smart cards
-
In: Attali, S., Jensen, T. (eds.), Springer, Heidelberg
-
Quisquater, J.-J., Samyde, D.: ElectroMagnetic Analysis (EMA): measures and counter-measures for smart cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, p. 200. Springer, Heidelberg (2001)
-
(2001)
E-Smart 2001. LNCS
, vol.2140
, pp. 200
-
-
Quisquater, J.-J.1
Samyde, D.2
-
35
-
-
0033342534
-
Non-malleable non-interactive zero knowledge and adaptive chosenciphertext security
-
IEEE
-
Sahai, A.: Non-malleable non-interactive zero knowledge and adaptive chosenciphertext security. In: FOCS, pp. 543-553. IEEE (1999)
-
(1999)
FOCS
, pp. 543-553
-
-
Sahai, A.1
|