scientific article; zbMATH DE number 1857508

From MaRDI portal
Revision as of 01:21, 8 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

zbMath1003.68609MaRDI QIDQ4788557

Jean-Jacques Quisquater, David Samyde

Publication date: 2 February 2003


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Localized Electromagnetic Analysis of Cryptographic Implementations, On the influence of optimizers in deep learning-based side-channel analysis, Signature schemes secure against hard-to-invert leakage, Memory leakage-resilient secret sharing schemes, Constant-round leakage-resilient zero-knowledge from collision resistance, Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation, Differential power analysis of stream ciphers with LFSRs, Improving the arithmetic of elliptic curves in the Jacobi model, Leakage-resilient cryptography from minimal assumptions, Proving SIFA protection of masked redundant circuits, Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage, The wonderful world of global random oracles, Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption, Design methodology and validity verification for a reactive countermeasure against EM attacks, Acoustic cryptanalysis, Evolutionary ciphers against differential power analysis and differential fault analysis, Naor-Yung paradigm with shared randomness and applications, Anonymous and leakage resilient IBE and IPE, Revisiting mutual information analysis: multidimensionality, neural estimation and optimality proofs, A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model, Fault Attacks on Public Key Elements: Application to DLP-Based Schemes, Provably secure certificate-based encryption with leakage resilience, A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting, Montgomery Ladder for All Genus 2 Curves in Characteristic 2, An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order, A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks, My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses, Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation, Unifying leakage models: from probing attacks to noisy leakage, Mutual information analysis: a comprehensive study, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, On the Connection between Leakage Tolerance and Adaptive Security, Leakage-resilient group signature: definitions and constructions, Fully Leakage-Resilient Codes, Private Circuits II: Keeping Secrets in Tamperable Circuits, Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model, A Leakage-Resilient Mode of Operation, Improving DPA by Peak Distribution Analysis, Random Order m-ary Exponentiation, Exponent Recoding and Regular Exponentiation Algorithms, Deterministic Public-Key Encryption Under Continual Leakage, Results on symmetric S-boxes constructed by concatenation of RSSBs, Naor-Yung Paradigm with Shared Randomness and Applications, Leakage Resilient Strong Key-Insulated Signatures in Public Channel, Leakage-Resilient Signatures, Black-box constructions of signature schemes in the bounded leakage setting, RSA key recovery from digit equivalence information, Quantum signature without classical private key