Hosoyamada, Akinori; Isobe, Takanori; Todo, Yosuke; Yasuda, Kan A modular approach to the incompressibility of block-cipher-based AEADs. (English) Zbl 1519.94133 Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13792, 585-619 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Hosoyamada} et al., Lect. Notes Comput. Sci. 13792, 585--619 (2023; Zbl 1519.94133) Full Text: DOI
Branco, Pedro; Döttling, Nico; Dujmović, Jesko Rate-1 incompressible encryption from standard assumptions. (English) Zbl 1519.94065 Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13748, 33-69 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Branco} et al., Lect. Notes Comput. Sci. 13748, 33--69 (2023; Zbl 1519.94065) Full Text: DOI
Döttling, Nico; Garg, Sanjam; Sekar, Sruthi; Wang, Mingyuan IBE with incompressible master secret and small identity secrets. (English) Zbl 1519.94219 Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13747, 588-617 (2023). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{N. Döttling} et al., Lect. Notes Comput. Sci. 13747, 588--617 (2023; Zbl 1519.94219) Full Text: DOI
Guan, Jiaxin; Wichs, Daniel; Zhandry, Mark Incompressible cryptography. (English) Zbl 1505.94071 Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 700-730 (2022). Reviewer: Guillermo Morales Luna (Ciudad de México) MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. Guan} et al., Lect. Notes Comput. Sci. 13275, 700--730 (2022; Zbl 1505.94071) Full Text: DOI
Moran, Tal; Wichs, Daniel Incompressible encodings. (English) Zbl 1503.94020 Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12170, 494-523 (2020). MSC: 94A29 94A60 PDFBibTeX XMLCite \textit{T. Moran} and \textit{D. Wichs}, Lect. Notes Comput. Sci. 12170, 494--523 (2020; Zbl 1503.94020) Full Text: DOI
Zhang, Linru; Wang, Xiangning; Chen, Yuechen; Yiu, Siu-Ming Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience. (English) Zbl 1492.94175 Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 666-690 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Zhang} et al., Lect. Notes Comput. Sci. 12578, 666--690 (2020; Zbl 1492.94175) Full Text: DOI
Dryja, Thaddeus; Liu, Quanquan C.; Park, Sunoo Static-memory-hard functions, and modeling the cost of space vs. time. (English) Zbl 1443.94055 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 33-66 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Dryja} et al., Lect. Notes Comput. Sci. 11239, 33--66 (2018; Zbl 1443.94055) Full Text: DOI
Wang, Zhiwei; Cao, Cheng; Yang, Nianhua; Chang, Victor ABE with improved auxiliary input for big data security. (English) Zbl 1372.68091 J. Comput. Syst. Sci. 89, 41-50 (2017). MSC: 68P25 PDFBibTeX XMLCite \textit{Z. Wang} et al., J. Comput. Syst. Sci. 89, 41--50 (2017; Zbl 1372.68091) Full Text: DOI
Durnoga, Konrad; Dziembowski, Stefan; Kazana, Tomasz; Zając, Michał; Zdanowicz, Maciej Bounded-retrieval model with keys derived from private data. (English) Zbl 1404.94064 Chen, Kefei (ed.) et al., Information security and cryptology. 12th international conference, Inscrypt 2016, Beijing, China, November 4–6, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-54704-6/pbk; 978-3-319-54705-3/ebook). Lecture Notes in Computer Science 10143, 273-290 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Durnoga} et al., Lect. Notes Comput. Sci. 10143, 273--290 (2017; Zbl 1404.94064) Full Text: DOI
Damgård, Ivan; Faust, Sebastian; Mukherjee, Pratyay; Venturi, Daniele Bounded tamper resilience: how to go beyond the algebraic barrier. (English) Zbl 1370.94501 J. Cryptology 30, No. 1, 152-190 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{I. Damgård} et al., J. Cryptology 30, No. 1, 152--190 (2017; Zbl 1370.94501) Full Text: DOI Link
Faonio, Antonio; Buus Nielsen, Jesper; Venturi, Daniele Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model. (English) Zbl 1380.94087 Theor. Comput. Sci. 660, 23-56 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Faonio} et al., Theor. Comput. Sci. 660, 23--56 (2017; Zbl 1380.94087) Full Text: DOI
Boneh, Dan; Corrigan-Gibbs, Henry; Schechter, Stuart Balloon hashing: a memory-hard function providing provable protection against sequential attacks. (English) Zbl 1404.94043 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 220-248 (2016). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 10031, 220--248 (2016; Zbl 1404.94043) Full Text: DOI
Bellare, Mihir; Kane, Daniel; Rogaway, Phillip Big-key symmetric encryption: resisting key exfiltration. (English) Zbl 1379.94030 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 373-402 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Bellare} et al., Lect. Notes Comput. Sci. 9814, 373--402 (2016; Zbl 1379.94030) Full Text: DOI
Hazay, Carmit; López-Alt, Adriana; Wee, Hoeteck; Wichs, Daniel Leakage-resilient cryptography from minimal assumptions. (English) Zbl 1348.94054 J. Cryptology 29, No. 3, 514-551 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Hazay} et al., J. Cryptology 29, No. 3, 514--551 (2016; Zbl 1348.94054) Full Text: DOI
Ateniese, Giuseppe; Faonio, Antonio; Kamara, Seny Leakage-resilient identification schemes from zero-knowledge proofs of storage. (English) Zbl 1338.94061 Groth, Jens (ed.), Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15–17, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27238-2/pbk; 978-3-319-27239-9/ebook). Lecture Notes in Computer Science 9496, 311-328 (2015). MSC: 94A60 68P20 PDFBibTeX XMLCite \textit{G. Ateniese} et al., Lect. Notes Comput. Sci. 9496, 311--328 (2015; Zbl 1338.94061) Full Text: DOI
Faonio, Antonio; Nielsen, Jesper Buus; Venturi, Daniele Mind your coins: fully leakage-resilient signatures with graceful degradation. (English) Zbl 1440.94049 Halldórsson, Magnús M. (ed.) et al., Automata, languages, and programming. 42nd international colloquium, ICALP 2015, Kyoto, Japan, July 6–10, 2015. Proceedings. Part I. Berlin: Springer. Lect. Notes Comput. Sci. 9134, 456-468 (2015). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{A. Faonio} et al., Lect. Notes Comput. Sci. 9134, 456--468 (2015; Zbl 1440.94049) Full Text: DOI
Durnoga, Konrad; Dziembowski, Stefan; Kazana, Tomasz; Zajac, Michal One-time programs with limited memory. (English) Zbl 1347.94031 Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 377-394 (2014). MSC: 94A60 68Q10 94A62 94C12 PDFBibTeX XMLCite \textit{K. Durnoga} et al., Lect. Notes Comput. Sci. 8567, 377--394 (2014; Zbl 1347.94031) Full Text: DOI
Jastrzȩbski, Michał; Dziembowski, Stefan Leakage resilience of the Blom’s key distribution scheme. (English) Zbl 1395.94291 Padró, Carles (ed.), Information theoretic security. 7th international conference, ICITS 2013, Singapore, November 28–30, 2013. Proceedings. Cham: Springer (ISBN 978-3-319-04267-1/pbk; 978-3-319-04268-8/ebook). Lecture Notes in Computer Science 8317, 220-237 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Jastrzȩbski} and \textit{S. Dziembowski}, Lect. Notes Comput. Sci. 8317, 220--237 (2014; Zbl 1395.94291) Full Text: DOI
Koblitz, Neal Crypto galore! (English) Zbl 1358.94002 Bodlaender, Hans L. (ed.) et al., The multivariate algorithmic revolution and beyond. Essays dedicated to Michael R. Fellows on the occasion of his 60th birthday. Berlin: Springer (ISBN 978-3-642-30890-1/pbk). Lecture Notes in Computer Science 7370, 39-50 (2012). MSC: 94-03 68-03 68Q25 94A60 PDFBibTeX XMLCite \textit{N. Koblitz}, Lect. Notes Comput. Sci. 7370, 39--50 (2012; Zbl 1358.94002) Full Text: DOI
Dziembowski, Stefan A lower bound on the key length of information-theoretic forward-secure storage schemes. (English) Zbl 1282.94043 Kurosawa, Kaoru (ed.), Information theoretic security. 4th international conference, ICITS 2009, Shizuoka, Japan, December 3–6, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14495-0/pbk). Lecture Notes in Computer Science 5973, 19-26 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Dziembowski}, Lect. Notes Comput. Sci. 5973, 19--26 (2010; Zbl 1282.94043) Full Text: DOI
Faust, Sebastian; Kiltz, Eike; Pietrzak, Krzysztof; Rothblum, Guy N. Leakage-resilient signatures. (English) Zbl 1274.94135 Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 343-360 (2010). MSC: 94A62 PDFBibTeX XMLCite \textit{S. Faust} et al., Lect. Notes Comput. Sci. 5978, 343--360 (2010; Zbl 1274.94135) Full Text: DOI
Pietrzak, Krzysztof A leakage-resilient mode of operation. (English) Zbl 1239.94062 Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 462-482 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Pietrzak}, Lect. Notes Comput. Sci. 5479, 462--482 (2009; Zbl 1239.94062) Full Text: DOI