Masking against Side-Channel Attacks: A Formal Security Proof (Englisch)
Freier Zugriff
- Neue Suche nach: Prouff, Emmanuel
- Neue Suche nach: Rivain, Matthieu
- Neue Suche nach: Prouff, Emmanuel
- Neue Suche nach: Rivain, Matthieu
In:
Advances in Cryptology – EUROCRYPT 2013
;
142-159
;
2013
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Masking against Side-Channel Attacks: A Formal Security Proof
-
Beteiligte:Prouff, Emmanuel ( Autor:in ) / Rivain, Matthieu ( Autor:in )
-
Erschienen in:Advances in Cryptology – EUROCRYPT 2013 ; 142-159Lecture Notes in Computer Science ; 7881 ; 142-159
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2013
-
Format / Umfang:18 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Candidate Multilinear Maps from Ideal LatticesGarg, Sanjam / Gentry, Craig / Halevi, Shai et al. | 2013
- 18
-
Lossy Codes and a New Variant of the Learning-With-Errors ProblemDöttling, Nico / Müller-Quade, Jörn et al. | 2013
- 35
-
A Toolkit for Ring-LWE CryptographyLyubashevsky, Vadim / Peikert, Chris / Regev, Oded et al. | 2013
- 55
-
Regularity of Lossy RSA on Subdomains and Its ApplicationsLewko, Mark / O’Neill, Adam / Smith, Adam et al. | 2013
- 76
-
Efficient Cryptosystems from 2 k -th Power Residue SymbolsJoye, Marc / Libert, Benoît et al. | 2013
- 93
-
Deterministic Public-Key Encryption for Adaptively Chosen Plaintext DistributionsRaghunathan, Ananth / Segev, Gil / Vadhan, Salil et al. | 2013
- 111
-
How to Watermark Cryptographic FunctionsNishimaki, Ryo et al. | 2013
- 126
-
Security Evaluations beyond Computing PowerVeyrat-Charvillon, Nicolas / Gérard, Benoît / Standaert, François-Xavier et al. | 2013
- 142
-
Masking against Side-Channel Attacks: A Formal Security ProofProuff, Emmanuel / Rivain, Matthieu et al. | 2013
- 160
-
Leakage-Resilient Cryptography from Minimal AssumptionsHazay, Carmit / López-Alt, Adriana / Wee, Hoeteck / Wichs, Daniel et al. | 2013
- 177
-
Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite FieldsJoux, Antoine et al. | 2013
- 194
-
Fast Cryptography in Genus 2Bos, Joppe W. / Costello, Craig / Hisil, Huseyin / Lauter, Kristin et al. | 2013
- 211
-
Graph-Theoretic Algorithms for the “Isomorphism of Polynomials” ProblemBouillaguet, Charles / Fouque, Pierre-Alain / Véber, Amandine et al. | 2013
- 228
-
Cryptanalysis of Full RIPEMD-128Landelle, Franck / Peyrin, Thomas et al. | 2013
- 245
-
New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision AnalysisStevens, Marc et al. | 2013
- 262
-
Improving Local Collisions: New Attacks on Reduced SHA-256Mendel, Florian / Nad, Tomislav / Schläffer, Martin et al. | 2013
- 279
-
Dynamic Proofs of Retrievability via Oblivious RAMCash, David / Küpçü, Alptekin / Wichs, Daniel et al. | 2013
- 296
-
Message-Locked Encryption and Secure DeduplicationBellare, Mihir / Keelveedhi, Sriram / Ristenpart, Thomas et al. | 2013
- 313
-
KeccakBertoni, Guido / Daemen, Joan / Peeters, Michaël / Assche, Gilles et al. | 2013
- 315
-
Batch Fully Homomorphic Encryption over the IntegersCheon, Jung Hee / Coron, Jean-Sébastien / Kim, Jinsu / Lee, Moon Sung / Lepoint, Tancrède / Tibouchi, Mehdi / Yun, Aaram et al. | 2013
- 336
-
Practical Homomorphic MACs for Arithmetic CircuitsCatalano, Dario / Fiore, Dario et al. | 2013
- 353
-
Streaming Authenticated Data StructuresPapamanthou, Charalampos / Shi, Elaine / Tamassia, Roberto / Yi, Ke et al. | 2013
- 371
-
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key SettingDerbez, Patrick / Fouque, Pierre-Alain / Jean, Jérémy et al. | 2013
- 388
-
New Links between Differential and Linear CryptanalysisBlondeau, Céline / Nyberg, Kaisa et al. | 2013
- 405
-
Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade EncryptionLee, Jooyoung et al. | 2013
- 426
-
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash FunctionsBaecher, Paul / Farshim, Pooya / Fischlin, Marc / Stam, Martijn et al. | 2013
- 444
-
Limitations of the Meta-reduction Technique: The Case of Schnorr SignaturesFischlin, Marc / Fleischhacker, Nils et al. | 2013
- 461
-
Practical Signatures from Standard AssumptionsBöhl, Florian / Hofheinz, Dennis / Jager, Tibor / Koch, Jessica / Seo, Jae Hong / Striecks, Christoph et al. | 2013
- 486
-
Locally Computable UOWHF with Linear ShrinkageApplebaum, Benny / Moses, Yoni et al. | 2013
- 503
-
Amplification of Chosen-Ciphertext SecurityLin, Huijia / Tessaro, Stefano et al. | 2013
- 520
-
Circular Chosen-Ciphertext Security with Compact CiphertextsHofheinz, Dennis et al. | 2013
- 537
-
MiniLEGO: Efficient Secure Two-Party Computation from General AssumptionsFrederiksen, Tore Kasper / Jakobsen, Thomas Pelle / Nielsen, Jesper Buus / Nordholt, Peter Sebastian / Orlandi, Claudio et al. | 2013
- 557
-
How to Hide Circuits in MPC an Efficient Framework for Private Function EvaluationMohassel, Payman / Sadeghian, Saeed et al. | 2013
- 575
-
Multi-party Computation of Polynomials and Branching Programs without Simultaneous InteractionGordon, S. Dov / Malkin, Tal / Rosulek, Mike / Wee, Hoeteck et al. | 2013
- 592
-
Quantum-Secure Message Authentication CodesBoneh, Dan / Zhandry, Mark et al. | 2013
- 609
-
One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy GamesTomamichel, Marco / Fehr, Serge / Kaniewski, Jędrzej / Wehner, Stephanie et al. | 2013
- 626
-
Quadratic Span Programs and Succinct NIZKs without PCPsGennaro, Rosario / Gentry, Craig / Parno, Bryan / Raykova, Mariana et al. | 2013
- 646
-
Zero-Knowledge Argument for Polynomial Evaluation with Application to BlacklistsBayer, Stephanie / Groth, Jens et al. | 2013
- 664
-
Resource-Restricted IndifferentiabilityDemay, Grégory / Gaži, Peter / Hirt, Martin / Maurer, Ueli et al. | 2013
- 684
-
On Concurrently Secure Computation in the Multiple Ideal Query ModelGoyal, Vipul / Jain, Abhishek et al. | 2013
- 702
-
Universally Composable Secure Computation with (Malicious) Physically Uncloneable FunctionsOstrovsky, Rafail / Scafuro, Alessandra / Visconti, Ivan / Wadia, Akshay et al. | 2013
- 719
-
How to Garble RAM Programs?Lu, Steve / Ostrovsky, Rafail et al. | 2013