Publication:4788557

From MaRDI portal


zbMath1003.68609MaRDI QIDQ4788557

Jean-Jacques Quisquater, David Samyde

Publication date: 2 February 2003



68P25: Data encryption (aspects in computer science)

68U99: Computing methodologies and applications


Related Items

A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting, On the Connection between Leakage Tolerance and Adaptive Security, Memory leakage-resilient secret sharing schemes, Fully Leakage-Resilient Codes, Revisiting mutual information analysis: multidimensionality, neural estimation and optimality proofs, Signature schemes secure against hard-to-invert leakage, Leakage-resilient cryptography from minimal assumptions, Evolutionary ciphers against differential power analysis and differential fault analysis, Mutual information analysis: a comprehensive study, Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model, Black-box constructions of signature schemes in the bounded leakage setting, On the influence of optimizers in deep learning-based side-channel analysis, The wonderful world of global random oracles, Provably secure certificate-based encryption with leakage resilience, Unifying leakage models: from probing attacks to noisy leakage, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, Leakage-resilient group signature: definitions and constructions, RSA key recovery from digit equivalence information, Quantum signature without classical private key, Constant-round leakage-resilient zero-knowledge from collision resistance, Proving SIFA protection of masked redundant circuits, Results on symmetric S-boxes constructed by concatenation of RSSBs, Improving the arithmetic of elliptic curves in the Jacobi model, Design methodology and validity verification for a reactive countermeasure against EM attacks, Acoustic cryptanalysis, Naor-Yung paradigm with shared randomness and applications, Anonymous and leakage resilient IBE and IPE, Differential power analysis of stream ciphers with LFSRs, Deterministic Public-Key Encryption Under Continual Leakage, Naor-Yung Paradigm with Shared Randomness and Applications, Localized Electromagnetic Analysis of Cryptographic Implementations, A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model, An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order, A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks, My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses, Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation, Improving DPA by Peak Distribution Analysis, Leakage Resilient Strong Key-Insulated Signatures in Public Channel, Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption, Leakage-Resilient Signatures, Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation, Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage, Fault Attacks on Public Key Elements: Application to DLP-Based Schemes, Montgomery Ladder for All Genus 2 Curves in Characteristic 2, Private Circuits II: Keeping Secrets in Tamperable Circuits, A Leakage-Resilient Mode of Operation, Random Order m-ary Exponentiation, Exponent Recoding and Regular Exponentiation Algorithms