Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice
From MaRDI portal
Publication:2794525
DOI10.1007/978-3-319-28166-7_32zbMath1423.94046OpenAlexW2396295274MaRDI QIDQ2794525
Daniel Masny, Edoardo Persichetti, Marcin Andrychowicz
Publication date: 10 March 2016
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-28166-7_32
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs
- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
- Leakage-Resilient Circuits without Computational Assumptions
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Leakage-Resilient Cryptography from the Inner-Product Extractor
- Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols
- Leakage-Resilient Signatures
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
- Protecting Cryptographic Keys against Continual Leakage
- Securing Computation against Continuous Leakage
- Provably Secure Higher-Order Masking of AES
- Leakage-Resilient Storage
- Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity
- Lapin: An Efficient Authentication Protocol Based on Ring-LPN
- Theory and Practice of a Leakage Resilient Masking Scheme
- On the Practical Security of a Leakage Resilient Masking Scheme
- Hardware Implementation and Side-Channel Analysis of Lapin
- Advances in Cryptology - CRYPTO 2003
- Theory of Cryptography
This page was built for publication: Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice