-
2
-
-
70350340328
-
Leakage-resilient public-key cryptography in the bounded-retrieval model
-
Springer, Lecture Notes in Computer Science
-
Joël Alwen, Yevgeniy Dodis, and Daniel Wichs. Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model. In Proc. Advances in Cryptology (CRYPTO 2009), volume 5677, pages 36-54. Springer, Lecture Notes in Computer Science.
-
Proc. Advances in Cryptology (CRYPTO 2009)
, vol.5677
, pp. 36-54
-
-
Alwen, J.1
Dodis, Y.2
Wichs, D.3
-
3
-
-
57049126579
-
Formally bounding the side-channel leakage in unknown-message attacks
-
Springer, Volume 5283 of Lecture Notes in Computer Science
-
Michael Backes and Boris Köpf. Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks. In Proc. 13th European Symposium on Research in Computer Security (ESORICS 2008), volume 5283 of Lecture Notes in Computer Science, pages 517-532. Springer, 2008.
-
(2008)
Proc. 13th European Symposium on Research in Computer Security (ESORICS 2008)
, pp. 517-532
-
-
Backes, M.1
Köpf., B.2
-
4
-
-
33646392466
-
Preventing timing leaks through transactional branching instructions
-
Elsevier
-
Gilles Barthe, Tamara Rezk, and Martijn Warnier. Preventing Timing Leaks Through Transactional Branching Instructions. In Proc. 3rd Workshop on Quantitative Aspects of Programming Languages (QAPL 2006), Electronic Notes in Theoretical Computer Science (ENTCS), pages 33-55. Elsevier, 2005.
-
(2005)
Proc. 3rd Workshop on Quantitative Aspects of Programming Languages (QAPL 2006), Electronic Notes in Theoretical Computer Science (ENTCS)
, pp. 33-55
-
-
Barthe, G.1
Rezk, T.2
Warnier, M.3
-
5
-
-
68549126859
-
Quantitative notions of leakage for one-try attacks
-
Elsevier
-
Christelle Braun, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. Quantitative notions of leakage for one-try attacks. In Proc. of the 25th Conference on Mathematical Foundations of Programming Semantics (MFPS 2009), volume 249 of ENTCS, pages 75-91. Elsevier, 2009.
-
(2009)
Proc. of the 25th Conference on Mathematical Foundations of Programming Semantics (MFPS 2009), Volume 249 of ENTCS
, pp. 75-91
-
-
Braun, C.1
Chatzikokolakis, K.2
Palamidessi, C.3
-
6
-
-
18844454571
-
Remote timing attacks are practical
-
David Brumley and Dan Boneh. Remote timing attacks are practical. Computer Networks, 48(5):701-716, 2005.
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 701-716
-
-
Brumley, D.1
Boneh, D.2
-
12
-
-
4344662082
-
RSA-OAEP is secure under the RSA assumption
-
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, and Jacques Stern. RSA-OAEP Is Secure under the RSA Assumption. Journal of Cryptology, 17(2):81-104, 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.2
, pp. 81-104
-
-
Fujisaki, E.1
Okamoto, T.2
Pointcheval, D.3
Stern, J.4
-
14
-
-
0033705991
-
Side channel cryptanalysis of product ciphers
-
John Kelsey, Bruce Schneier, David Wagner, and Chris Hall. Side Channel Cryptanalysis of Product Ciphers. Journal of Computer Security (JCS), 8(2-3):141-158, 2000.
-
(2000)
Journal of Computer Security (JCS)
, vol.8
, Issue.2-3
, pp. 141-158
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
15
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
-
Springer, Volume 1109 of Lecture Notes in Computer Science
-
Paul Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Proc. Advances in Cryptology (CRYPTO 1996), volume 1109 of Lecture Notes in Computer Science, pages 104-113. Springer, 1996.
-
(1996)
Proc. Advances in Cryptology (CRYPTO 1996)
, pp. 104-113
-
-
Kocher, P.1
-
20
-
-
35048852134
-
Physically observable cryptography (Extended Abstract)
-
Springer, Volume 2951 of Lecture Notes in Computer Science
-
Silvio Micali and Leonid Reyzin. Physically Observable Cryptography (Extended Abstract). In Proc. First Theory of Cryptography Conference (TCC 2004), volume 2951 of Lecture Notes in Computer Science, pages 278-296. Springer, 2004.
-
(2004)
Proc. First Theory of Cryptography Conference (TCC 2004)
, pp. 278-296
-
-
Micali, S.1
Reyzin, L.2
-
21
-
-
70350303869
-
Public-key cryptosystems resilient to key leakage
-
Springer, Volume 5677 of Lecture Notes in Computer Science
-
Moni Naor and Gil Segev. Public-Key Cryptosystems Resilient to Key Leakage. In Proc. Advances in Cryptology (CRYPTO 2009), volume 5677 of Lecture Notes in Computer Science, pages 18-35. Springer, 2009.
-
(2009)
Proc. Advances in Cryptology (CRYPTO 2009)
, pp. 18-35
-
-
Naor, M.1
Segev, G.2
-
22
-
-
57049127668
-
Quantifying timing leaks and cost optimisation
-
Springer, Volume 5308 of Lecture Notes in Computer Science
-
Alessandra Di Pierro, Chris Hankin, and Herbert Wiklicky. Quantifying timing leaks and cost optimisation. In Proc. 10th International Conference on Information and Communications Security (ICICS 2008), volume 5308 of Lecture Notes in Computer Science, pages 81-96. Springer, 2008.
-
(2008)
Proc. 10th International Conference on Information and Communications Security (ICICS 2008)
, pp. 81-96
-
-
Pierro, A.D.1
Hankin, C.2
Wiklicky, H.3
-
23
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
Springer, Volume 576 of Lecture Notes in Computer Science
-
Charles Rackoff and Daniel R. Simon. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In Proc. Advances in Cryptology (CRYPTO 1991), volume 576 of Lecture Notes in Computer Science, pages 433-444. Springer, 1992.
-
(1992)
Proc. Advances in Cryptology (CRYPTO 1991)
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
26
-
-
67650694228
-
A unified framework for the analysis of side-channel key recovery attacks
-
Springer, Volume 5479 of Lecture Notes in Computer Science
-
Francois-Xavier Standaert, Tal Malkin, and Moti Yung. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. In Proc. 28th International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2009), volume 5479 of Lecture Notes in Computer Science, pages 443-461. Springer, 2009.
-
(2009)
Proc. 28th International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2009)
, pp. 443-461
-
-
Standaert, F.-X.1
Malkin, T.2
Yung, M.3
|