Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1857508 - MaRDI portal

scientific article; zbMATH DE number 1857508

From MaRDI portal
Publication:4788557

zbMath1003.68609MaRDI QIDQ4788557

Jean-Jacques Quisquater, David Samyde

Publication date: 2 February 2003


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (48)

Localized Electromagnetic Analysis of Cryptographic ImplementationsOn the influence of optimizers in deep learning-based side-channel analysisSignature schemes secure against hard-to-invert leakageMemory leakage-resilient secret sharing schemesConstant-round leakage-resilient zero-knowledge from collision resistanceMind Your Coins: Fully Leakage-Resilient Signatures with Graceful DegradationDifferential power analysis of stream ciphers with LFSRsImproving the arithmetic of elliptic curves in the Jacobi modelLeakage-resilient cryptography from minimal assumptionsProving SIFA protection of masked redundant circuitsLeakage-Resilient Identification Schemes from Zero-Knowledge Proofs of StorageThe wonderful world of global random oraclesConstant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent AssumptionDesign methodology and validity verification for a reactive countermeasure against EM attacksAcoustic cryptanalysisEvolutionary ciphers against differential power analysis and differential fault analysisNaor-Yung paradigm with shared randomness and applicationsAnonymous and leakage resilient IBE and IPERevisiting mutual information analysis: multidimensionality, neural estimation and optimality proofsA Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage ModelFault Attacks on Public Key Elements: Application to DLP-Based SchemesProvably secure certificate-based encryption with leakage resilienceA Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage SettingMontgomery Ladder for All Genus 2 Curves in Characteristic 2An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection OrderA Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel AttacksMy Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key GuessesLeakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability ObfuscationUnifying leakage models: from probing attacks to noisy leakageMutual information analysis: a comprehensive studyLeakage-resilient attribute based encryption in prime-order groups via predicate encodingsOn the Connection between Leakage Tolerance and Adaptive SecurityLeakage-resilient group signature: definitions and constructionsFully Leakage-Resilient CodesPrivate Circuits II: Keeping Secrets in Tamperable CircuitsFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelA Leakage-Resilient Mode of OperationImproving DPA by Peak Distribution AnalysisRandom Order m-ary ExponentiationExponent Recoding and Regular Exponentiation AlgorithmsDeterministic Public-Key Encryption Under Continual LeakageResults on symmetric S-boxes constructed by concatenation of RSSBsNaor-Yung Paradigm with Shared Randomness and ApplicationsLeakage Resilient Strong Key-Insulated Signatures in Public ChannelLeakage-Resilient SignaturesBlack-box constructions of signature schemes in the bounded leakage settingRSA key recovery from digit equivalence informationQuantum signature without classical private key




This page was built for publication: