Learning with physical rounding for linear and quadratic leakage functions
From MaRDI portal
Publication:6186764
DOI10.1007/978-3-031-38548-3_14MaRDI QIDQ6186764
Pierrick Méaux, François-Xavier Standaert, Charles Momin, Balazs Udvarhelyi, Clément Hoffmann, Yann Rotella
Publication date: 2 February 2024
Published in: Advances in Cryptology – CRYPTO 2023 (Search for Journal in Brave)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A new efficient algorithm for computing Gröbner bases \((F_4)\)
- Exploring crypto dark matter: new simple PRF candidates and their applications
- Improved side-channel analysis of finite-field multiplication
- A new birthday-type algorithm for attacking the fresh re-keying countermeasure
- MPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applications
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP
- On the complexity of the \(F_5\) Gröbner basis algorithm
- Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability
- Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems
- Cryptography from Learning Parity with Noise
- Pseudorandom Functions and Lattices
- Side-Channel Analysis of Multiplications in GF(2128)
- Trapdoors for hard lattices and new cryptographic constructions
- Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
- Bonsai Trees, or How to Delegate a Lattice Basis
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Lectures on Finite Fields
- Lapin: An Efficient Authentication Protocol Based on Ring-LPN
- Conversion of Security Proofs from One Leakage Model to Another: A New Issue
- Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note
- Fully homomorphic encryption using ideal lattices
- Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
- Power Analysis Attacks
- Boolean Functions for Cryptography and Coding Theory
- FPGA Implementations of SPRING
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Hardware Implementation and Side-Channel Analysis of Lapin
- Advances in Cryptology - CRYPTO 2003
- All in the XL Family: Theory and Practice
- Topics in Cryptology – CT-RSA 2005
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- How Fast Can Higher-Order Masking Be in Software?
- Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN
- Applied Cryptography and Network Security
- On lattices, learning with errors, random linear codes, and cryptography
- Topics in Cryptology – CT-RSA 2004
- \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption
- Towards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipher
This page was built for publication: Learning with physical rounding for linear and quadratic leakage functions