Pages that link to "Item:Q3452345"
From MaRDI portal
The following pages link to Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems (Q3452345):
Displaying 50 items.
- Generalized probabilistic satisfiability and applications to modelling attackers with side-channel capabilities (Q2424888) (← links)
- Elliptic curve cryptography: the serpentine course of a paradigm shift (Q2430981) (← links)
- On some connections between statistics and cryptology (Q2437860) (← links)
- Elliptic curve cryptosystems in the presence of permanent and transient faults (Q2486874) (← links)
- On two DES implementations secure against differential power analysis in smart-cards (Q2500477) (← links)
- Differential power analysis of stream ciphers with LFSRs (Q2629409) (← links)
- Enabling cloud storage auditing with key-exposure resilience under continual key-leakage (Q2660966) (← links)
- Succinct Diophantine-satisfiability arguments (Q2691605) (← links)
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption (Q2692358) (← links)
- SILVER -- statistical independence and leakage verification (Q2692368) (← links)
- Trojan-resilience without cryptography (Q2697869) (← links)
- On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance (Q2794567) (← links)
- Buying AES Design Resistance with Speed and Energy (Q2803624) (← links)
- Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes (Q2817458) (← links)
- Leakage-Resilient Functional Encryption via Pair Encodings (Q2817484) (← links)
- Deterministic Encoding into Twisted Edwards Curves (Q2817819) (← links)
- Deterministic Public-Key Encryption Under Continual Leakage (Q2822678) (← links)
- Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice (Q2822694) (← links)
- Naor-Yung Paradigm with Shared Randomness and Applications (Q2827710) (← links)
- Signatures Resilient to Uninvertible Leakage (Q2827729) (← links)
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman (Q2835601) (← links)
- Keeping Secrets in Resource Aware Components (Q2870285) (← links)
- A First-Order Leak-Free Masking Countermeasure (Q2890002) (← links)
- Localized Electromagnetic Analysis of Cryptographic Implementations (Q2890009) (← links)
- Remote IP Protection Using Timing Channels (Q2942840) (← links)
- Partial Key Exposure Attack on CRT-RSA (Q2945387) (← links)
- On Symmetric Encryption with Distinguishable Decryption Failures (Q2946887) (← links)
- Higher-Order Side Channel Security and Mask Refreshing (Q2946888) (← links)
- A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones (Q2946892) (← links)
- Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks (Q2946893) (← links)
- A New Partial Key Exposure Attack on Multi-power RSA (Q2947151) (← links)
- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy (Q2947523) (← links)
- A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model (Q2953870) (← links)
- Reverse Cycle Walking and Its Applications (Q2958143) (← links)
- Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers (Q2975800) (← links)
- Hiding Higher-Order Side-Channel Leakage (Q2975801) (← links)
- A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks (Q2975813) (← links)
- My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses (Q2975817) (← links)
- Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation (Q2980862) (← links)
- Can a Quantum Computer Run the von Neumann Architecture? (Q3000932) (← links)
- Exponent Blinding Does Not Always Lift (Partial) Spa Resistance to Higher-Level Security (Q3011304) (← links)
- Defeating RSA Multiply-Always and Message Blinding Countermeasures (Q3073697) (← links)
- Improving DPA by Peak Distribution Analysis (Q3084258) (← links)
- Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers (Q3090973) (← links)
- Certified Security Proofs of Cryptographic Protocols in the Computational Model: An Application to Intrusion Resilience (Q3100218) (← links)
- Leakage Resilient Strong Key-Insulated Signatures in Public Channel (Q3103599) (← links)
- Square Always Exponentiation (Q3104721) (← links)
- Partial Key Exposure: Generalized Framework to Attack RSA (Q3104725) (← links)
- Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes (Q3193255) (← links)
- Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption (Q3194601) (← links)