Pages that link to "Item:Q3582747"
From MaRDI portal
The following pages link to Protecting Cryptographic Keys against Continual Leakage (Q3582747):
Displaying 14 items.
- Identity-based broadcast encryption with continuous leakage resilience (Q781856) (← links)
- Unifying leakage models: from probing attacks to noisy leakage (Q1715856) (← links)
- New approach to practical leakage-resilient public-key cryptography (Q2023806) (← links)
- Hierarchical attribute based encryption with continuous leakage-resilience (Q2213099) (← links)
- Post-challenge leakage in public-key encryption (Q2257289) (← links)
- Locally decodable and updatable non-malleable codes and their applications (Q2303459) (← links)
- Fully leakage-resilient signatures (Q2392093) (← links)
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks (Q2403460) (← links)
- Efficient Leakage Resilient Circuit Compilers (Q2790050) (← links)
- Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice (Q2794525) (← links)
- Leakage Resilience of the Blom’s Key Distribution Scheme (Q2948266) (← links)
- Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience (Q3012821) (← links)
- How to Compute in the Presence of Leakage (Q3449567) (← links)
- Fully Homomorphic Encryption with Auxiliary Inputs (Q3454587) (← links)