Noisy Leakage Revisited
From MaRDI portal
Publication:2948382
DOI10.1007/978-3-662-46803-6_6zbMath1326.94089OpenAlexW777813921MaRDI QIDQ2948382
Maciej Skórski, Stefan Dziembowski, Sebastian Faust
Publication date: 30 September 2015
Published in: Advances in Cryptology - EUROCRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46803-6_6
Related Items (11)
Towards tight random probing security ⋮ Survey of information security ⋮ A Better Chain Rule for HILL Pseudoentropy - Beyond Bounded Leakage ⋮ Removing the field size loss from Duc et al.'s conjectured bound for masked encodings ⋮ Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model ⋮ Unifying leakage models: from probing attacks to noisy leakage ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ Optimal Amplification of Noisy Leakages ⋮ Unconditionally secure computation against low-complexity leakage ⋮ Correction to: ``Unconditionally secure computation against low-complexity leakage ⋮ The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free
This page was built for publication: Noisy Leakage Revisited