Advances in cryptology - CRYPTO '99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15--19, 1999. Proceedings
From MaRDI portal
Publication:1301510
DOI10.1007/3-540-48405-1zbMath0921.00042OpenAlexW2484860292WikidataQ27915561 ScholiaQ27915561MaRDI QIDQ1301510
No author found.
Publication date: 6 September 1999
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-48405-1
Proceedings of conferences of miscellaneous specific interest (00B25) Proceedings, conferences, collections, etc. pertaining to information and communication theory (94-06)
Related Items (9)
Optimal forgeries against polynomial-based MACs and GCM ⋮ Related-Key Attacks Against Full Hummingbird-2 ⋮ Masking and leakage-resilient primitives: one, the other(s) or both? ⋮ Spin me right round rotational symmetry for FPGA-specific AES: extended version ⋮ Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates ⋮ Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications ⋮ Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ One-Key Compression Function Based MAC with Security Beyond Birthday Bound
This page was built for publication: Advances in cryptology - CRYPTO '99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15--19, 1999. Proceedings