The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free
From MaRDI portal
Publication:2056741
DOI10.1007/978-3-030-77886-6_14zbMath1479.94298OpenAlexW3096760981MaRDI QIDQ2056741
Maciej Skórski, Antonio Faonio, Mark Simkin, Maciej Obremski, Daniele Venturi, Gianluca Brian, João L. Ribeiro
Publication date: 8 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-77886-6_14
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Multiparty protocols, pseudorandom generators for Logspace, and time- space trade-offs
- Indistinguishability obfuscation for Turing machines: constant overhead and amortization
- Unifying leakage models: from probing attacks to noisy leakage
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
- Unifying leakage models on a Rényi day
- Leakage resilient secret sharing and applications
- Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures
- On Continual Leakage of Discrete Log Representations
- Leakage-Tolerant Interactive Protocols
- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy
- Detection of Algebraic Manipulation in the Presence of Leakage
- Noisy Leakage Revisited
- Detecting Algebraic Manipulation in Leaky Storage Systems
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- Leakage-Resilient Storage
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Quasi‐random classes of hypergraphs
- Masking against Side-Channel Attacks: A Formal Security Proof
- Towards sound approaches to counteract power-analysis attacks
- On cryptography with auxiliary input
- Protecting Circuits from Computationally Bounded and Noisy Leakage
- Leakage-Resilient Non-malleable Codes
- MORE ON THE SUM-PRODUCT PHENOMENON IN PRIME FIELDS AND ITS APPLICATIONS
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
- Advances in Cryptology - CRYPTO 2003
- Automata, Languages and Programming
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
- Theory of Cryptography
- On the local leakage resilience of linear secret sharing schemes
- Leakage-Resilient Secret Sharing in Non-Compartmentalized Models.
This page was built for publication: The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free