Pages that link to "Item:Q2010587"
From MaRDI portal
The following pages link to Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version (Q2010587):
Displaying 11 items.
- Masking proofs are tight and how to exploit it in security evaluations (Q1648843) (← links)
- The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free (Q2056741) (← links)
- Towards tight random probing security (Q2128995) (← links)
- Making Masking Security Proofs Concrete (Q2948337) (← links)
- Effective and efficient masking with low noise using small-Mersenne-prime ciphers (Q6061536) (← links)
- Linkable ring signature scheme with stronger security guarantees (Q6595333) (← links)
- From random probing to noisy leakages without field-size dependence (Q6637530) (← links)
- \textsf{Plover}: masking-friendly hash-and-sign lattice signatures (Q6637727) (← links)
- Raccoon: a masking-friendly signature proven in the probing model (Q6648199) (← links)
- Formal security proofs via Doeblin coefficients: optimal side-channel factorization from noisy leakage to random probing (Q6652995) (← links)
- Leakage certification made simple (Q6652997) (← links)