Pages that link to "Item:Q3452345"
From MaRDI portal
The following pages link to Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems (Q3452345):
Displaying 50 items.
- An algebraic approach for reasoning about information flow (Q2024334) (← links)
- A formal analysis of prefetching in profiled cache-timing attacks on block ciphers (Q2043316) (← links)
- Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods (Q2048183) (← links)
- On the power of expansion: more efficient constructions in the random probing model (Q2056735) (← links)
- Leakage resilient value comparison with application to message authentication (Q2056738) (← links)
- The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free (Q2056741) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM (Q2096530) (← links)
- RSA key recovery from digit equivalence information (Q2096611) (← links)
- Improved see-in-the-middle attacks on AES (Q2104443) (← links)
- Differential fault attack on lightweight block cipher PIPO (Q2104448) (← links)
- Bounded delay timed channel coding (Q2112103) (← links)
- Efficient FPGA design of exception-free generic elliptic curve cryptosystems (Q2117041) (← links)
- Differential power analysis of the Picnic signature scheme (Q2118537) (← links)
- Standard model leakage-resilient authenticated key exchange using inner-product extractors (Q2119952) (← links)
- Adaptive extractors and their application to leakage resilient secret sharing (Q2129011) (← links)
- Constructing locally leakage-resilient linear secret-sharing schemes (Q2129019) (← links)
- Constant-round leakage-resilient zero-knowledge from collision resistance (Q2135523) (← links)
- First full-fledged side channel attack on HMAC-SHA-2 (Q2145284) (← links)
- Generalizing statistical ineffective fault attacks in the spirit of side-channel attacks (Q2145289) (← links)
- White-box ECDSA: challenges and existing solutions (Q2145299) (← links)
- \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption (Q2146096) (← links)
- Attacking ECDSA leaking discrete bits with a more efficient lattice (Q2151304) (← links)
- On the worst-case side-channel security of ECC point randomization in embedded devices (Q2152029) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- Side-channeling the \textsf{Kalyna} key expansion (Q2152165) (← links)
- Layering quantum-resistance into classical digital signature algorithms (Q2154036) (← links)
- Survey on recent trends towards generalized differential and boomerang uniformities (Q2154879) (← links)
- Differential uniformity and linearity of S-boxes by multiplicative complexity (Q2154885) (← links)
- Verifying constant-time implementations by abstract interpretation (Q2167720) (← links)
- Recovering secrets from prefix-dependent leakage (Q2191199) (← links)
- On the exact relationship between the mutual information metric and the success rate metric (Q2195409) (← links)
- Speeding up regular elliptic curve scalar multiplication without precomputation (Q2210646) (← links)
- System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory (Q2228439) (← links)
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman (Q2293251) (← links)
- Locally decodable and updatable non-malleable codes and their applications (Q2303459) (← links)
- Results on symmetric S-boxes constructed by concatenation of RSSBs (Q2311423) (← links)
- Hadamard matrices, \(d\)-linearly independent sets and correlation-immune Boolean functions with minimum Hamming weights (Q2324768) (← links)
- Transparency order for Boolean functions: analysis and construction (Q2324785) (← links)
- Improving the arithmetic of elliptic curves in the Jacobi model (Q2380005) (← links)
- On the structural weakness of the GGHN stream cipher (Q2380845) (← links)
- Survey of information security (Q2385398) (← links)
- Power attacks on a side-channel resistant elliptic curve implementation (Q2390277) (← links)
- Fully leakage-resilient signatures (Q2392093) (← links)
- Design methodology and validity verification for a reactive countermeasure against EM attacks (Q2397443) (← links)
- Acoustic cryptanalysis (Q2397444) (← links)
- Naor-Yung paradigm with shared randomness and applications (Q2401764) (← links)
- Public key encryption resilient to leakage and tampering attacks (Q2402358) (← links)
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks (Q2403460) (← links)
- Threshold public key encryption scheme resilient against continual leakage without random oracles (Q2418660) (← links)