Entry Date:
April 4, 2014

Leakage-Resilient Cryptography


Can we build cryptographic systems that maintain security even if key information leaks continuously over time?