scientific article; zbMATH DE number 1857508
From MaRDI portal
zbMath1003.68609MaRDI QIDQ4788557
Jean-Jacques Quisquater, David Samyde
Publication date: 2 February 2003
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Data encryption (aspects in computer science) (68P25) Computing methodologies and applications (68U99)
Related Items
Localized Electromagnetic Analysis of Cryptographic Implementations, On the influence of optimizers in deep learning-based side-channel analysis, Signature schemes secure against hard-to-invert leakage, Memory leakage-resilient secret sharing schemes, Constant-round leakage-resilient zero-knowledge from collision resistance, Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation, Differential power analysis of stream ciphers with LFSRs, Improving the arithmetic of elliptic curves in the Jacobi model, Leakage-resilient cryptography from minimal assumptions, Proving SIFA protection of masked redundant circuits, Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage, The wonderful world of global random oracles, Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption, Design methodology and validity verification for a reactive countermeasure against EM attacks, Acoustic cryptanalysis, Evolutionary ciphers against differential power analysis and differential fault analysis, Naor-Yung paradigm with shared randomness and applications, Anonymous and leakage resilient IBE and IPE, Revisiting mutual information analysis: multidimensionality, neural estimation and optimality proofs, A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model, Fault Attacks on Public Key Elements: Application to DLP-Based Schemes, Provably secure certificate-based encryption with leakage resilience, A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting, Montgomery Ladder for All Genus 2 Curves in Characteristic 2, An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order, A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks, My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses, Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation, Unifying leakage models: from probing attacks to noisy leakage, Mutual information analysis: a comprehensive study, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, On the Connection between Leakage Tolerance and Adaptive Security, Leakage-resilient group signature: definitions and constructions, Fully Leakage-Resilient Codes, Private Circuits II: Keeping Secrets in Tamperable Circuits, Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model, A Leakage-Resilient Mode of Operation, Improving DPA by Peak Distribution Analysis, Random Order m-ary Exponentiation, Exponent Recoding and Regular Exponentiation Algorithms, Deterministic Public-Key Encryption Under Continual Leakage, Results on symmetric S-boxes constructed by concatenation of RSSBs, Naor-Yung Paradigm with Shared Randomness and Applications, Leakage Resilient Strong Key-Insulated Signatures in Public Channel, Leakage-Resilient Signatures, Black-box constructions of signature schemes in the bounded leakage setting, RSA key recovery from digit equivalence information, Quantum signature without classical private key