Pages that link to "Item:Q3627451"
From MaRDI portal
The following pages link to A Leakage-Resilient Mode of Operation (Q3627451):
Displaying 41 items.
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- Leakage-resilient cryptography from minimal assumptions (Q315546) (← links)
- Masking and leakage-resilient primitives: one, the other(s) or both? (Q892292) (← links)
- Another step towards realizing random oracles: non-malleable point obfuscation (Q1648795) (← links)
- On the leakage-resilient key exchange (Q1684049) (← links)
- Leakage-resilient cryptography from puncturable primitives and obfuscation (Q1710617) (← links)
- Leakage resilient one-way functions: the auxiliary-input setting (Q1784737) (← links)
- (In)security of ring-LWE under partial key exposure (Q2027270) (← links)
- Towards a ring analogue of the leftover hash lemma (Q2027271) (← links)
- Leakage resilient value comparison with application to message authentication (Q2056738) (← links)
- Adventures in crypto dark matter: attacks and fixes for weak pseudorandom functions (Q2061985) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- Leakage-resilient key exchange and two-seed extractors (Q2096493) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions (Q2161418) (← links)
- Post-challenge leakage in public-key encryption (Q2257289) (← links)
- Locally decodable and updatable non-malleable codes and their applications (Q2303459) (← links)
- Fully leakage-resilient signatures (Q2392093) (← links)
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks (Q2403460) (← links)
- Beyond-birthday security for permutation-based Feistel networks (Q2657129) (← links)
- Trojan-resilience without cryptography (Q2697869) (← links)
- Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks (Q2794524) (← links)
- Big-Key Symmetric Encryption: Resisting Key Exfiltration (Q2835594) (← links)
- The Chain Rule for HILL Pseudoentropy, Revisited (Q2946442) (← links)
- On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages (Q2946470) (← links)
- Near Collision Attack on the Grain v1 Stream Cipher (Q2946894) (← links)
- Leakage Resilience of the Blom’s Key Distribution Scheme (Q2948266) (← links)
- A Better Chain Rule for HILL Pseudoentropy - Beyond Bounded Leakage (Q2953822) (← links)
- A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model (Q2953870) (← links)
- On the Complexity of Breaking Pseudoentropy (Q2988853) (← links)
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting (Q3179355) (← links)
- Simulating Auxiliary Inputs, Revisited (Q3179356) (← links)
- Pseudoentropy: Lower-Bounds for Chain Rules and Transformations (Q3179357) (← links)
- Leakage-Resilient Signatures (Q3408204) (← links)
- Public-Key Encryption Schemes with Auxiliary Inputs (Q3408205) (← links)
- How to Compute in the Presence of Leakage (Q3449567) (← links)
- A Practical Leakage-Resilient Signature Scheme in the Generic Group Model (Q3455486) (← links)
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (Q3627450) (← links)
- On the Connection between Leakage Tolerance and Adaptive Security (Q4916027) (← links)
- Non-malleable codes from leakage resilient cryptographic primitives (Q6575050) (← links)
- Improved reductions from noisy to bounded and probing leakages via hockey-stick divergences (Q6652998) (← links)