Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions. Fujisaki, E. & Xagawa, K. In Cheon, J. H. & Takagi, T., editors, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I, volume 10031, of Lecture Notes in Computer Science, pages 908–938, 2016.
Paper doi bibtex @inproceedings{DBLP:conf/asiacrypt/FujisakiX16,
author = {Eiichiro Fujisaki and
Keita Xagawa},
editor = {Jung Hee Cheon and
Tsuyoshi Takagi},
title = {Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage
of Arbitrary Functions},
booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
on the Theory and Application of Cryptology and Information Security,
Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
series = {Lecture Notes in Computer Science},
volume = {10031},
pages = {908--938},
year = {2016},
url = {https://doi.org/10.1007/978-3-662-53887-6\_33},
doi = {10.1007/978-3-662-53887-6\_33},
timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/asiacrypt/FujisakiX16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"Xv4u493STbGJrt252","bibbaseid":"fujisaki-xagawa-publickeycryptosystemsresilienttocontinuoustamperingandleakageofarbitraryfunctions-2016","authorIDs":[],"author_short":["Fujisaki, E.","Xagawa, K."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Eiichiro"],"propositions":[],"lastnames":["Fujisaki"],"suffixes":[]},{"firstnames":["Keita"],"propositions":[],"lastnames":["Xagawa"],"suffixes":[]}],"editor":[{"firstnames":["Jung","Hee"],"propositions":[],"lastnames":["Cheon"],"suffixes":[]},{"firstnames":["Tsuyoshi"],"propositions":[],"lastnames":["Takagi"],"suffixes":[]}],"title":"Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions","booktitle":"Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I","series":"Lecture Notes in Computer Science","volume":"10031","pages":"908–938","year":"2016","url":"https://doi.org/10.1007/978-3-662-53887-6_33","doi":"10.1007/978-3-662-53887-6_33","timestamp":"Wed, 25 Sep 2019 01:00:00 +0200","biburl":"https://dblp.org/rec/conf/asiacrypt/FujisakiX16.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/asiacrypt/FujisakiX16,\n author = {Eiichiro Fujisaki and\n Keita Xagawa},\n editor = {Jung Hee Cheon and\n Tsuyoshi Takagi},\n title = {Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage\n of Arbitrary Functions},\n booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference\n on the Theory and Application of Cryptology and Information Security,\n Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},\n series = {Lecture Notes in Computer Science},\n volume = {10031},\n pages = {908--938},\n year = {2016},\n url = {https://doi.org/10.1007/978-3-662-53887-6\\_33},\n doi = {10.1007/978-3-662-53887-6\\_33},\n timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/asiacrypt/FujisakiX16.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Fujisaki, E.","Xagawa, K."],"editor_short":["Cheon, J. H.","Takagi, T."],"key":"DBLP:conf/asiacrypt/FujisakiX16","id":"DBLP:conf/asiacrypt/FujisakiX16","bibbaseid":"fujisaki-xagawa-publickeycryptosystemsresilienttocontinuoustamperingandleakageofarbitraryfunctions-2016","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-662-53887-6_33"},"downloads":0},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/17/5868.bib","creationDate":"2020-02-14T02:49:45.833Z","downloads":0,"keywords":[],"search_terms":["public","key","cryptosystems","resilient","continuous","tampering","leakage","arbitrary","functions","fujisaki","xagawa"],"title":"Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions","year":2016,"dataSources":["E3xnHK39Zch42ZpoA"]}