Learning with physical rounding for linear and quadratic leakage functions
From MaRDI portal
Publication:6186764
Recommendations
- Towards sound fresh re-keying with hard (physical) learning problems
- A new birthday-type algorithm for attacking the fresh re-keying countermeasure
- Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability
- High-resolution EM attacks against leakage-resilient PRFs explained and an improved construction
- Noisy leakage revisited
Cites work
- scientific article; zbMATH DE number 1950612 (Why is no real title available?)
- scientific article; zbMATH DE number 1979272 (Why is no real title available?)
- scientific article; zbMATH DE number 2081058 (Why is no real title available?)
- scientific article; zbMATH DE number 2151220 (Why is no real title available?)
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- A new birthday-type algorithm for attacking the fresh re-keying countermeasure
- A new efficient algorithm for computing Gröbner bases (F₄)
- Advances in Cryptology - CRYPTO 2003
- All in the XL Family: Theory and Practice
- Applied Cryptography and Network Security
- Bonsai trees, or how to delegate a lattice basis
- Boolean functions for cryptography and coding theory
- Conversion of security proofs from one leakage model to another: a new issue
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Cryptography from learning parity with noise
- Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability
- Exploring crypto dark matter: new simple PRF candidates and their applications
- FPGA implementations of SPRING and their countermeasures against side-channel attacks
- Fresh re-keying: security against side-channel and fault attacks for low-cost devices
- Fully homomorphic encryption from ring-LWE and security for key dependent messages
- Fully homomorphic encryption using ideal lattices
- Hardware implementation and side-channel analysis of Lapin
- How fast can higher-order masking be in software?
- Improved side-channel analysis of finite-field multiplication
- Lapin: an efficient authentication protocol based on ring-LPN
- Lectures on finite fields
- MPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applications
- On lattices, learning with errors, random linear codes, and cryptography
- On the complexity of the \(F_5\) Gröbner basis algorithm
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- Power Analysis Attacks
- Pseudorandom functions and lattices
- Pseudorandom functions in almost constant depth from low-noise LPN
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP
- Shuffling against side-channel attacks: a comprehensive study with cautionary note
- Side-Channel Analysis of Multiplications in GF(2128)
- Topics in Cryptology – CT-RSA 2004
- Topics in Cryptology – CT-RSA 2005
- Towards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipher
- Towards sound fresh re-keying with hard (physical) learning problems
- Trapdoors for hard lattices and new cryptographic constructions
- \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption
Cited in
(2)
This page was built for publication: Learning with physical rounding for linear and quadratic leakage functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6186764)