The following pages link to (Q4788557):
Displayed 48 items.
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- Leakage-resilient cryptography from minimal assumptions (Q315546) (← links)
- Evolutionary ciphers against differential power analysis and differential fault analysis (Q362183) (← links)
- Mutual information analysis: a comprehensive study (Q656515) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Black-box constructions of signature schemes in the bounded leakage setting (Q781055) (← links)
- On the influence of optimizers in deep learning-based side-channel analysis (Q832396) (← links)
- The wonderful world of global random oracles (Q1648798) (← links)
- Provably secure certificate-based encryption with leakage resilience (Q1698724) (← links)
- Unifying leakage models: from probing attacks to noisy leakage (Q1715856) (← links)
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings (Q1752551) (← links)
- Leakage-resilient group signature: definitions and constructions (Q1999051) (← links)
- RSA key recovery from digit equivalence information (Q2096611) (← links)
- Quantum signature without classical private key (Q2113965) (← links)
- Constant-round leakage-resilient zero-knowledge from collision resistance (Q2135523) (← links)
- Proving SIFA protection of masked redundant circuits (Q2147200) (← links)
- Results on symmetric S-boxes constructed by concatenation of RSSBs (Q2311423) (← links)
- Improving the arithmetic of elliptic curves in the Jacobi model (Q2380005) (← links)
- Design methodology and validity verification for a reactive countermeasure against EM attacks (Q2397443) (← links)
- Acoustic cryptanalysis (Q2397444) (← links)
- Naor-Yung paradigm with shared randomness and applications (Q2401764) (← links)
- Anonymous and leakage resilient IBE and IPE (Q2407713) (← links)
- Differential power analysis of stream ciphers with LFSRs (Q2629409) (← links)
- Deterministic Public-Key Encryption Under Continual Leakage (Q2822678) (← links)
- Naor-Yung Paradigm with Shared Randomness and Applications (Q2827710) (← links)
- Localized Electromagnetic Analysis of Cryptographic Implementations (Q2890009) (← links)
- A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model (Q2953870) (← links)
- An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order (Q2975799) (← links)
- A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks (Q2975813) (← links)
- My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses (Q2975817) (← links)
- Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation (Q2980862) (← links)
- Improving DPA by Peak Distribution Analysis (Q3084258) (← links)
- Leakage Resilient Strong Key-Insulated Signatures in Public Channel (Q3103599) (← links)
- Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption (Q3194601) (← links)
- Leakage-Resilient Signatures (Q3408204) (← links)
- Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation (Q3448807) (← links)
- Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage (Q3460114) (← links)
- Fault Attacks on Public Key Elements: Application to DLP-Based Schemes (Q3506358) (← links)
- Montgomery Ladder for All Genus 2 Curves in Characteristic 2 (Q3519561) (← links)
- Private Circuits II: Keeping Secrets in Tamperable Circuits (Q3593103) (← links)
- A Leakage-Resilient Mode of Operation (Q3627451) (← links)
- Random Order m-ary Exponentiation (Q3634511) (← links)
- Exponent Recoding and Regular Exponentiation Algorithms (Q3637149) (← links)
- A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting (Q4605650) (← links)
- On the Connection between Leakage Tolerance and Adaptive Security (Q4916027) (← links)
- Memory leakage-resilient secret sharing schemes (Q5046490) (← links)
- Fully Leakage-Resilient Codes (Q5738793) (← links)
- Revisiting mutual information analysis: multidimensionality, neural estimation and optimality proofs (Q6054729) (← links)