How to Compute in the Presence of Leakage (Q3449567): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / OpenAlex ID
 
Property / OpenAlex ID: W2113960803 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure computation with information leaking to an adversary / rank
 
Normal rank
Property / cites work
 
Property / cites work: Program Obfuscation with Leaky Hardware / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783716 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiparty computation secure against continual memory leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circular-Secure Encryption from Decision Diffie-Hellman / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4228521 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Storage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Cryptography from the Inner-Product Extractor / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Circuits without Computational Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Public-Key Cryptography in the Presence of Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Storing Secrets on Continually Leaky Devices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Founding Cryptography on Tamper-Proof Hardware Tokens / rank
 
Normal rank
Property / cites work
 
Property / cites work: One-Time Programs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Software protection and simulation on oblivious RAMs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Securing Computation against Continuous Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: After-the-Fact Leakage in Public-Key Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protecting Cryptographic Keys against Continual Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to leak on key updates / rank
 
Normal rank
Property / cites work
 
Property / cites work: Achieving Leakage Resilience through Dual System Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Resilient to Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Leakage-Resilient Mode of Operation / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Compute under $${\mathcal {\varvec{AC}}}^\mathbf{0}$$ Leakage without Secure Hardware / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiplying matrices faster than coppersmith-winograd / rank
 
Normal rank

Latest revision as of 01:12, 11 July 2024

scientific article
Language Label Description Also known as
English
How to Compute in the Presence of Leakage
scientific article

    Statements

    How to Compute in the Presence of Leakage (English)
    0 references
    0 references
    0 references
    0 references
    4 November 2015
    0 references
    0 references
    0 references
    0 references
    0 references
    leakage resilience
    0 references
    cryptography
    0 references
    side channels
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references