Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
36
views
22
references
Top references
cited by
27
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,186
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology - CRYPTO 2009
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
other
Author(s):
Joël Alwen
,
Yevgeniy Dodis
,
Daniel Wichs
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Renewable Energy – Distribution Grid
Most cited references
22
Record
: found
Abstract
: not found
Book Chapter
: not found
Short Signatures from the Weil Pairing
Dan Boneh
,
Ben Lynn
,
Hovav Shacham
(2001)
0
comments
Cited
197
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Privacy Amplification by Public Discussion
Charles Bennett
,
Gilles Brassard
,
Jean-Marc Robert
(1988)
0
comments
Cited
186
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Ran Canetti
,
Hugo Krawczyk
(2001)
0
comments
Cited
119
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 36-54
DOI:
10.1007/978-3-642-03356-8_3
SO-VID:
81880f77-9a6f-4a83-975a-0b6563528cfa
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Reconstructing RSA Private Keys from Random Key Bits
pp. 18
Public-Key Cryptosystems Resilient to Key Leakage
pp. 317
Batch Binary Edwards
pp. 355
Computational Indistinguishability Amplification: Tight Product Theorems for System Composition
pp. 541
Privacy-Enhancing Auctions Using Rational Cryptography
pp. 36
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
pp. 55
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
pp. 108
Randomizable Proofs and Delegatable Anonymous Credentials
pp. 126
Computational Differential Privacy
pp. 143
Probabilistically Checkable Arguments
pp. 177
On the Amortized Complexity of Zero-Knowledge Protocols
pp. 192
Linear Algebra with Sub-linear Zero-Knowledge Arguments
pp. 286
How to Encipher Messages on a Small Domain
pp. 303
How to Hash into Elliptic Curves
pp. 374
Merkle Puzzles Are Optimal — An O(n2)-Query Attack on Any Key Exchange from a Random Oracle
pp. 408
Improving the Security of Quantum Protocols via Commit-and-Open
pp. 445
How Risky Is the Random-Oracle Model?
pp. 577
On Bounded Distance Decoding, Unique Shortest Vectors, and the Minimum Distance Problem
pp. 595
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
pp. 654
Short and Stateless Signatures from the RSA Assumption
Similar content
3,186
Secure communication: quantum cryptography with a photon turnstile.
Authors:
Edo Waks
,
Kyo Inoue
,
Charles Santori
…
Blockchain, Cryptography, and Consensus
Authors:
Christian Cachin
Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing
Authors:
Abebe Diro
,
Naveen Chilamkurti
,
Neeraj Kumar
See all similar
Cited by
27
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
Authors:
Sebastian Faust
,
Tal Rabin
,
Leonid Reyzin
…
Public-Key Encryption Schemes with Auxiliary Inputs
Authors:
Yevgeniy Dodis
,
Shafi Goldwasser
,
Yael Tauman Kalai
…
Protecting Cryptographic Keys against Continual Leakage
Authors:
Ali Juma
,
Yevgeniy Vahlis
See all cited by