The following pages link to (Q4797801):
Displaying 50 items.
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- Glitch and laser fault attacks onto a secure AES implementation on a SRAM-based FPGA (Q656510) (← links)
- Mutual information analysis: a comprehensive study (Q656515) (← links)
- On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives (Q726335) (← links)
- Correlation power analysis and higher-order masking implementation of WAGE (Q832394) (← links)
- Horizontal collision correlation attack on elliptic curves (Q892284) (← links)
- Efficient and secure big data storage system with leakage resilience in cloud computing (Q1626278) (← links)
- Provably secure certificate-based encryption with leakage resilience (Q1698724) (← links)
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings (Q1752551) (← links)
- Leakage-resilient group signature: definitions and constructions (Q1999051) (← links)
- RSA key recovery from digit equivalence information (Q2096611) (← links)
- Differential power analysis of the Picnic signature scheme (Q2118537) (← links)
- Towards tight random probing security (Q2128995) (← links)
- Protecting secure ICs against side-channel attacks by identifying and quantifying potential EM and leakage hotspots at simulation stage (Q2145294) (← links)
- On the exact relationship between the mutual information metric and the success rate metric (Q2195409) (← links)
- Strongly leakage resilient authenticated key exchange, revisited (Q2334443) (← links)
- Survey of information security (Q2385398) (← links)
- Design methodology and validity verification for a reactive countermeasure against EM attacks (Q2397443) (← links)
- Acoustic cryptanalysis (Q2397444) (← links)
- Public key encryption resilient to leakage and tampering attacks (Q2402358) (← links)
- Strong authenticated key exchange with auxiliary inputs (Q2402976) (← links)
- Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks (Q2403460) (← links)
- Generalized probabilistic satisfiability and applications to modelling attackers with side-channel capabilities (Q2424888) (← links)
- Enabling cloud storage auditing with key-exposure resilience under continual key-leakage (Q2660966) (← links)
- Succinct Diophantine-satisfiability arguments (Q2691605) (← links)
- SILVER -- statistical independence and leakage verification (Q2692368) (← links)
- On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance (Q2794567) (← links)
- Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions (Q2817809) (← links)
- Localized Electromagnetic Analysis of Cryptographic Implementations (Q2890009) (← links)
- A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model (Q2953870) (← links)
- A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks (Q2975813) (← links)
- Leakage Resilient Strong Key-Insulated Signatures in Public Channel (Q3103599) (← links)
- Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks (Q3104720) (← links)
- Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes (Q3193255) (← links)
- Vectorizing Higher-Order Masking (Q3297549) (← links)
- Leakage-Resilient Signatures (Q3408204) (← links)
- Fault Attacks on Public Key Elements: Application to DLP-Based Schemes (Q3506358) (← links)
- Private Circuits II: Keeping Secrets in Tamperable Circuits (Q3593103) (← links)
- A Probing Attack on AES (Q3605395) (← links)
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (Q3627450) (← links)
- A Leakage-Resilient Mode of Operation (Q3627451) (← links)
- Random Order m-ary Exponentiation (Q3634511) (← links)
- Exponent Recoding and Regular Exponentiation Algorithms (Q3637149) (← links)
- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model (Q3644199) (← links)
- A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting (Q4605650) (← links)
- (Q5010397) (← links)
- Hamming Weight Attacks on Cryptographic Hardware — Breaking Masking Defense (Q5030179) (← links)
- Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor (Q5040408) (← links)
- Cryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power Analysis (Q5094763) (← links)
- Cryptanalysis of a Chaotic Block Cryptographic System Against Template Attacks (Q5148876) (← links)