Pages that link to "Item:Q2914283"
From MaRDI portal
The following pages link to How to Compute under $${\mathcal {\varvec{AC}}}^\mathbf{0}$$ Leakage without Secure Hardware (Q2914283):
Displaying 12 items.
- On the impossibility of cryptography with tamperable randomness (Q1688399) (← links)
- Unifying leakage models: from probing attacks to noisy leakage (Q1715856) (← links)
- Adaptive extractors and their application to leakage resilient secret sharing (Q2129011) (← links)
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification (Q2232597) (← links)
- Locally decodable and updatable non-malleable codes and their applications (Q2303459) (← links)
- Efficient Leakage Resilient Circuit Compilers (Q2790050) (← links)
- Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits (Q2799088) (← links)
- How to Compute in the Presence of Leakage (Q3449567) (← links)
- (Q5092467) (← links)
- Unconditionally secure computation against low-complexity leakage (Q5918097) (← links)
- On the local leakage resilience of linear secret sharing schemes (Q5918308) (← links)
- Correction to: ``Unconditionally secure computation against low-complexity leakage'' (Q5925544) (← links)