Skip to main navigation
Skip to search
Skip to main content
The Hebrew University of Jerusalem Home
Approve / Request updates on publications
Home
Profiles
Research units
Research output
Prizes
Search by expertise, name or affiliation
Public-key cryptosystems resilient to key leakage
Moni Naor
*
,
Gil Segev
*
Corresponding author for this work
Research output
:
Contribution to journal
›
Article
›
peer-review
76
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Public-key cryptosystems resilient to key leakage'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Resilient
100%
Key Leakage
100%
Public Key Cryptosystem
100%
Hash Proof System
80%
1-bit
60%
Encryption Scheme
60%
Side-channel Attacks
60%
Computational Diffie-Hellman Assumption
40%
Generic Construction
40%
CCA Security
40%
Secret Key
40%
Systems-based
20%
Theory of Computing
20%
Baltimore
20%
Generic Approach
20%
Public-key Encryption Schemes
20%
Existing Buildings
20%
Chosen-ciphertext Attack
20%
Public Key Encryption
20%
Lattice-based
20%
San Francisco
20%
Physical Implementation
20%
Cramer-Shoup Cryptosystem
20%
Santa Barbara
20%
Information Leakage
20%
San Jose
20%
Cryptology
20%
Cryptographic Scheme
20%
Theory of Cryptography
20%
Quadratic Residuosity Assumption
20%
CCA1
20%
Cold Boot Attack
20%
Paillier
20%
6-bit
20%
Adversarial Model
20%
Computer Science
Proof System
100%
Public-Key Cryptosystems
100%
Encryption Scheme
75%
side-channel
75%
public-key encryption
50%
Diffie-Hellman-Merkle key exchange
50%
chosen ciphertext attack
25%
Information Leakage
25%
Cryptography
25%
Adversarial Model
25%
Cold Boot Attack
25%
Physical Implementation
25%
Cryptology
25%