The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free (Q2056741): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
Removed claim: author (P16): Item:Q1629418
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / author
 
Property / author: João L. Ribeiro / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-77886-6_14 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3096760981 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Non-malleable Codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4425685 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Continual Leakage of Discrete Log Representations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Detection of Algebraic Manipulation in the Presence of Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation for Turing machines: constant overhead and amortization / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiparty protocols, pseudorandom generators for Logspace, and time- space trade-offs / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the local leakage resilience of linear secret sharing schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Tolerant Interactive Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: MORE ON THE SUM-PRODUCT PHENOMENON IN PRIME FIELDS AND ITS APPLICATIONS / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards sound approaches to counteract power-analysis attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quasi‐random classes of hypergraphs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Storage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Public-Key Cryptography in the Presence of Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: On cryptography with auxiliary input / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unifying Leakage Models: From Probing Attacks to Noisy Leakage. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unifying leakage models: from probing attacks to noisy leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Noisy Leakage Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protecting Circuits from Computationally Bounded and Noisy Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automata, Languages and Programming / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Secret Sharing in Non-Compartmentalized Models. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Detecting Algebraic Manipulation in Leaky Storage Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Resilient to Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5743415 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unifying leakage models on a Rényi day / rank
 
Normal rank
Property / cites work
 
Property / cites work: Masking against Side-Channel Attacks: A Formal Security Proof / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage resilient secret sharing and applications / rank
 
Normal rank

Latest revision as of 10:20, 27 July 2024

scientific article
Language Label Description Also known as
English
The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free
scientific article

    Statements

    The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    8 December 2021
    0 references
    conditional average min-entropy
    0 references
    dense leakage model
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers