Pages that link to "Item:Q3582746"
From MaRDI portal
The following pages link to Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks (Q3582746):
Displaying 16 items.
- Masking and leakage-resilient primitives: one, the other(s) or both? (Q892292) (← links)
- Keymill: side-channel resilient key generator, a new concept for SCA-security by design (Q1698634) (← links)
- Leakage resilient one-way functions: the auxiliary-input setting (Q1784737) (← links)
- Leakage resilient value comparison with application to message authentication (Q2056738) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions (Q2106709) (← links)
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP (Q2145296) (← links)
- Locally decodable and updatable non-malleable codes and their applications (Q2303459) (← links)
- Strong authenticated key exchange with auxiliary inputs (Q2402976) (← links)
- Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems (Q2829218) (← links)
- Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF (Q2958140) (← links)
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting (Q3179355) (← links)
- Simulating Auxiliary Inputs, Revisited (Q3179356) (← links)
- Rogue Decryption Failures: Reconciling AE Robustness Notions (Q3460100) (← links)
- A Leakage Resilient MAC (Q3460113) (← links)
- Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity (Q5205023) (← links)