Mathematical Research Data Initiative
Main page
Recent changes
Random page
Help about MediaWiki
Create a new Item
Create a new Property
Create a new EntitySchema
Merge two items
In other projects
Discussion
View source
View history
Purge
English
Log in

Noisy Leakage Revisited

From MaRDI portal
Publication:2948382
Jump to:navigation, search

DOI10.1007/978-3-662-46803-6_6zbMath1326.94089OpenAlexW777813921MaRDI QIDQ2948382

Maciej Skórski, Stefan Dziembowski, Sebastian Faust

Publication date: 30 September 2015

Published in: Advances in Cryptology - EUROCRYPT 2015 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-46803-6_6



Mathematics Subject Classification ID

Cryptography (94A60)


Related Items (11)

Towards tight random probing security ⋮ Survey of information security ⋮ A Better Chain Rule for HILL Pseudoentropy - Beyond Bounded Leakage ⋮ Removing the field size loss from Duc et al.'s conjectured bound for masked encodings ⋮ Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model ⋮ Unifying leakage models: from probing attacks to noisy leakage ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ Optimal Amplification of Noisy Leakages ⋮ Unconditionally secure computation against low-complexity leakage ⋮ Correction to: ``Unconditionally secure computation against low-complexity leakage ⋮ The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free




This page was built for publication: Noisy Leakage Revisited

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:2948382&oldid=15939596"
Tools
What links here
Related changes
Special pages
Printable version
Permanent link
Page information
MaRDI portal item
This page was last edited on 3 February 2024, at 21:16.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki