Pages that link to "Item:Q2010587"
From MaRDI portal
The following pages link to Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version (Q2010587):
Displaying 8 items.
- The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free (Q2056741) (← links)
- Towards tight random probing security (Q2128995) (← links)
- Linkable ring signature scheme with stronger security guarantees (Q6595333) (← links)
- From random probing to noisy leakages without field-size dependence (Q6637530) (← links)
- \textsf{Plover}: masking-friendly hash-and-sign lattice signatures (Q6637727) (← links)
- Raccoon: a masking-friendly signature proven in the probing model (Q6648199) (← links)
- Formal security proofs via Doeblin coefficients: optimal side-channel factorization from noisy leakage to random probing (Q6652995) (← links)
- Leakage certification made simple (Q6652997) (← links)