Pages that link to "Item:Q4649778"
From MaRDI portal
The following pages link to Practical Leakage-Resilient Symmetric Cryptography (Q4649778):
Displayed 13 items.
- On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives (Q726335) (← links)
- Masking and leakage-resilient primitives: one, the other(s) or both? (Q892292) (← links)
- Leakage resilient value comparison with application to message authentication (Q2056738) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions (Q2106709) (← links)
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP (Q2145296) (← links)
- Strong authenticated key exchange with auxiliary inputs (Q2402976) (← links)
- Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks (Q2794524) (← links)
- On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages (Q2946470) (← links)
- A Better Chain Rule for HILL Pseudoentropy - Beyond Bounded Leakage (Q2953822) (← links)
- Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF (Q2958140) (← links)
- Simulating Auxiliary Inputs, Revisited (Q3179356) (← links)
- A Leakage Resilient MAC (Q3460113) (← links)