Author of the publication

Survey: Leakage Resilience and the Bounded Retrieval Model.

, , and . ICITS, volume 5973 of Lecture Notes in Computer Science, page 1-18. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leakage-Resilient Cryptography from Minimal Assumptions., , , and . J. Cryptology, 29 (3): 514-551 (2016)Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits., , , and . IEEE Trans. Information Theory, 62 (12): 7179-7194 (2016)On Continual Leakage of Discrete Log Representations., , , and . ASIACRYPT (2), volume 8270 of Lecture Notes in Computer Science, page 401-420. Springer, (2013)Reusable Designated-Verifier NIZKs for all NP from CDH., , and . EUROCRYPT (2), volume 11477 of Lecture Notes in Computer Science, page 593-621. Springer, (2019)Isolated Proofs of Knowledge and Isolated Zero Knowledge., , and . EUROCRYPT, volume 4965 of Lecture Notes in Computer Science, page 509-526. Springer, (2008)Non-Interactive Delegation for Low-Space Non-Deterministic Computation., , , , and . IACR Cryptology ePrint Archive, (2017)Storing Secrets on Continually Leaky Devices., , , and . IACR Cryptology ePrint Archive, (2011)Private Anonymous Data Access., , , and . IACR Cryptology ePrint Archive, (2018)Leakage-Resilient Cryptography from Minimal Assumptions., , , and . IACR Cryptology ePrint Archive, (2012)Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing., , , and . IACR Cryptology ePrint Archive, (2018)