Trojan-resilience without cryptography
From MaRDI portal
Publication:2697869
DOI10.1007/978-3-030-90453-1_14OpenAlexW3212134243MaRDI QIDQ2697869
Małgorzata Gałązka, Stefan Dziembowski, Tomasz Lizurej, Suvradip Chakraborty, Krzysztof Pietrzak, Michelle Yeo
Publication date: 13 April 2023
Full work available at URL: https://doi.org/10.1007/978-3-030-90453-1_14
Cites Work
- Secure outsourcing of cryptographic circuits manufacturing
- From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Indistinguishability Amplification
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- A Leakage-Resilient Mode of Operation
- Advances in Cryptology - CRYPTO 2003
- Secure Multiparty Computation and Secret Sharing
- Theory of Cryptography
- Unnamed Item
This page was built for publication: Trojan-resilience without cryptography