Pages that link to "Item:Q5428136"
From MaRDI portal
The following pages link to Advances in Cryptology - CRYPTO 2003 (Q5428136):
Displaying 50 items.
- Leakage-resilient cryptography from minimal assumptions (Q315546) (← links)
- Secure hardware implementation of nonlinear functions in the presence of glitches (Q656517) (← links)
- A low-cost memory remapping scheme for address bus protection (Q666092) (← links)
- Identity-based broadcast encryption with continuous leakage resilience (Q781856) (← links)
- Correlation power analysis and higher-order masking implementation of WAGE (Q832394) (← links)
- Threshold implementations of small S-boxes (Q892276) (← links)
- Masking and leakage-resilient primitives: one, the other(s) or both? (Q892292) (← links)
- Another step towards realizing random oracles: non-malleable point obfuscation (Q1648795) (← links)
- The wonderful world of global random oracles (Q1648798) (← links)
- Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data (Q1648801) (← links)
- All the AES you need on Cortex-M3 and M4 (Q1698628) (← links)
- Unifying leakage models: from probing attacks to noisy leakage (Q1715856) (← links)
- Minimizing locality of one-way functions via semi-private randomized encodings (Q1747656) (← links)
- Statistical properties of side-channel and fault injection attacks using coding theory (Q1749798) (← links)
- Leakage resilient one-way functions: the auxiliary-input setting (Q1784737) (← links)
- Characterization and enumeration of complementary dual abelian codes (Q1786972) (← links)
- Classical leakage resilience from fault-tolerant quantum computation (Q2010581) (← links)
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version (Q2010587) (← links)
- Fault template attacks on block ciphers exploiting fault propagation (Q2055630) (← links)
- Tornado: automatic generation of probing-secure masked bitsliced implementations (Q2055659) (← links)
- Side-channel masking with pseudo-random generator (Q2055660) (← links)
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields (Q2056720) (← links)
- Dummy shuffling against algebraic attacks in white-box implementations (Q2056730) (← links)
- Fast verification of masking schemes in characteristic two (Q2056733) (← links)
- On the power of expansion: more efficient constructions in the random probing model (Q2056735) (← links)
- Leakage-resilience of the Shamir secret-sharing scheme against physical-bit leakages (Q2056737) (← links)
- Leakage resilient value comparison with application to message authentication (Q2056738) (← links)
- The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free (Q2056741) (← links)
- Random probing security: verification, composition, expansion and new constructions (Q2096491) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- Leakage-resilient key exchange and two-seed extractors (Q2096493) (← links)
- Reverse firewalls for actively secure MPCs (Q2096547) (← links)
- Single-trace side-channel analysis on polynomial-based MAC schemes (Q2106682) (← links)
- Custom instruction support for modular defense against side-channel and fault attacks (Q2106699) (← links)
- Lightweight authenticated encryption mode suitable for threshold implementation (Q2119030) (← links)
- Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version (Q2120989) (← links)
- Towards tight random probing security (Q2128995) (← links)
- Secure wire shuffling in the probing model (Q2128997) (← links)
- Adaptive extractors and their application to leakage resilient secret sharing (Q2129011) (← links)
- Resilient uniformity: applying resiliency in masking (Q2130025) (← links)
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP (Q2145296) (← links)
- Proving SIFA protection of masked redundant circuits (Q2147200) (← links)
- Private circuits with quasilinear randomness (Q2170088) (← links)
- \textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon} (Q2170090) (← links)
- Spin me right round rotational symmetry for FPGA-specific AES: extended version (Q2188965) (← links)
- Strong continuous non-malleable encoding schemes with tamper-detection (Q2195381) (← links)
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification (Q2232597) (← links)
- Leakage-resilient coin tossing (Q2251154) (← links)
- Locally decodable and updatable non-malleable codes and their applications (Q2303459) (← links)
- Fully leakage-resilient signatures (Q2392093) (← links)