Sciweavers

31 search results - page 7 / 7
» A New Variant of the Cramer-Shoup KEM Secure against Chosen ...
Sort
View
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev