-
1
-
-
70350342511
-
Fast cryptographic primitives and circular-secure encryption based on hard learning problems
-
In: Halevi, S. (ed.), Springer, Heidelberg
-
Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast cryptographic primitives and circular-secure encryption based on hard learning problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595–618. Springer, Heidelberg (2009)
-
(2009)
CRYPTO 2009. LNCS
, vol.5677
, pp. 595-618
-
-
Applebaum, B.1
Cash, D.2
Peikert, C.3
Sahai, A.4
-
2
-
-
79960014155
-
New algorithms for learning in presence of errors
-
In: Aceto, L., Henzinger, M., Sgall, J. (eds.), Springer, Heidelberg
-
Arora, S., Ge, R.: New algorithms for learning in presence of errors. In: Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part I. LNCS, vol. 6755, pp. 403–415. Springer, Heidelberg (2011)
-
(2011)
ICALP 2011, Part I. LNCS
, vol.6755
, pp. 403-415
-
-
Arora, S.1
Ge, R.2
-
3
-
-
84990049662
-
-
Cryptology ePrint Archive, Report 2015/542
-
Belaïd, S., Coron, J.-S., Fouque, P.-A., Gérard, B., Kammerer, J.-G., Prouff, E.: Improved side-channel analysis of finite-field multiplication. Cryptology ePrint Archive, Report 2015/542, (2015). http://eprint. iacr. org/
-
(2015)
Improved Side-Channel Analysis of Finite-Field Multiplication
-
-
Belaïd, S.1
Coron, J.-S.2
Fouque, P.-A.3
Gérard, B.4
Kammerer, J.-G.5
Prouff, E.6
-
4
-
-
84916212309
-
Side-Channel analysis of multiplications in GF(2128)
-
In: Sarkar, P., Iwata, T. (eds.), Springer, Heidelberg
-
Belaïd, S., Fouque, P.-A., Gérard, B.: Side-Channel analysis of multiplications in GF(2128). In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014, Part II. LNCS, vol. 8874, pp. 306–325. Springer, Heidelberg (2014)
-
(2014)
ASIACRYPT 2014, Part II. LNCS
, vol.8874
, pp. 306-325
-
-
Belaïd, S.1
Fouque, P.-A.2
Gérard, B.3
-
5
-
-
0033702346
-
Noise-tolerant learning, the parity problem, and the statistical query model
-
ACM Press, May
-
Blum, A., Kalai, A., Wasserman, H.: Noise-tolerant learning, the parity problem, and the statistical query model. In: 32nd ACM STOC, pp. 435–440. ACM Press, May 2000
-
(2000)
32Nd ACM STOC
, pp. 435-440
-
-
Blum, A.1
Kalai, A.2
Wasserman, H.3
-
6
-
-
84942591680
-
-
Cryptology ePrint Archive, Report 2015/049
-
Bogos, S., Tramer, F., Vaudenay, S.: On solving LPN using BKW and variants. Cryptology ePrint Archive, Report 2015/049, (2015). http://eprint. iacr. org/2015/049
-
(2015)
On Solving LPN Using BKW and Variants
-
-
Bogos, S.1
Tramer, F.2
Vaudenay, S.3
-
7
-
-
84866726757
-
Higher-Order masking schemes for S-boxes
-
In: Canteaut, A. (ed.), Springer, Heidelberg
-
Carlet, C., Goubin, L., Prouff, E., Quisquater, M., Rivain, M.: Higher-Order masking schemes for S-boxes. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 366–384. Springer, Heidelberg (2012)
-
(2012)
FSE 2012. LNCS
, vol.7549
, pp. 366-384
-
-
Carlet, C.1
Goubin, L.2
Prouff, E.3
Quisquater, M.4
Rivain, M.5
-
8
-
-
84946057808
-
Approximation, randomization and combinatorial optimization, algorithms and techniques
-
(eds.), of Lecture Notes in Computer Science. Springer, Heidelberg
-
Chekuri, C., Jansen, Rolim, K., J. D. P., Trevisan, L. (eds.) Approximation, randomization and combinatorial optimization, algorithms and techniques. In: 8th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, APPROX 2005 and 9th International Workshop on Randomization and Computation, RANDOM 2005, Berkeley, CA, USA, August 22–24, 2005, Proceedings, vol. 3624 of Lecture Notes in Computer Science. Springer, Heidelberg (2005)
-
(2005)
8Th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, APPROX 2005 and 9Th International Workshop on Randomization and Computation, RANDOM 2005, Berkeley, CA, USA, August 22–24, 2005, Proceedings
, vol.3624
-
-
Chekuri, C.1
Jansen, R.2
Trevisan, L.3
-
9
-
-
84880169811
-
A new second-order side channel attack based on linear regression
-
Dabosville, G., Doget, J., Prouff, E.: A new second-order side channel attack based on linear regression. IEEE Trans. Comput. 62(8), 1629–1640 (2013)
-
(2013)
IEEE Trans. Comput
, vol.62
, Issue.8
, pp. 1629-1640
-
-
Dabosville, G.1
Doget, J.2
Prouff, E.3
-
10
-
-
84887214027
-
A testing methodology for side-channel resistance validation
-
Goodwill, G., Jun, B., Jaffe, J., Rohatgi, P.: A testing methodology for side-channel resistance validation. In: Workshop NIAT (2011)
-
(2011)
Workshop NIAT
-
-
Goodwill, G.1
Jun, B.2
Jaffe, J.3
Rohatgi, P.4
-
11
-
-
84916641241
-
Solving LPN using covering codes
-
In: Sarkar, P., Iwata, T. (eds.), Springer, Heidelberg
-
Guo, Q., Johansson, T., Löndahl, C.: Solving LPN using covering codes. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8873, pp. 1–20. Springer, Heidelberg (2014)
-
(2014)
ASIACRYPT 2014. LNCS
, vol.8873
, pp. 1-20
-
-
Guo, Q.1
Johansson, T.2
Löndahl, C.3
-
12
-
-
77954651737
-
New generic algorithms for hard knapsacks
-
In: Gilbert, H. (ed.), Springer, Heidelberg
-
Howgrave-Graham, N., Joux, A.: New generic algorithms for hard knapsacks. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 235–256. Springer, Heidelberg (2010)
-
(2010)
EUROCRYPT 2010. LNCS
, vol.6110
, pp. 235-256
-
-
Howgrave-Graham, N.1
Joux, A.2
-
13
-
-
35248830337
-
Private circuits: Securing hardware against probing attacks
-
In: Boneh, D. (ed.), Springer, Heidelberg
-
Ishai, Y., Sahai, A., Wagner, D.: Private circuits: securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463–481. Springer, Heidelberg (2003)
-
(2003)
CRYPTO 2003. LNCS
, vol.2729
, pp. 463-481
-
-
Ishai, Y.1
Sahai, A.2
Wagner, D.3
-
14
-
-
84866723385
-
-
Cryptology ePrint Archive, Report 2011/377
-
Kirchner, P.: Improved generalized birthday attack. Cryptology ePrint Archive, Report 2011/377, (2011). http://eprint. iacr. org/2011/377
-
(2011)
Improved Generalized Birthday Attack
-
-
Kirchner, P.1
-
15
-
-
33749998666
-
An improved LPN algorithm
-
In: De Prisco, R., Yung, M. (eds.), Springer, Heidelberg
-
Levieil, É., Fouque, P.-A.: An improved LPN algorithm. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 348–359. Springer, Heidelberg (2006)
-
(2006)
SCN 2006. LNCS
, vol.4116
, pp. 348-359
-
-
Levieil, É.1
Fouque, P.-A.2
-
17
-
-
77953509171
-
Fresh rekeying: Security against side-channel and fault attacks for low-cost devices
-
In: Bernstein, D. J., Lange, T. (eds.), Springer, Heidelberg
-
Medwed, M., Standaert, F.-X., Grosschädl, J., Regazzoni, F.: Fresh rekeying: security against side-channel and fault attacks for low-cost devices. In: Bernstein, D. J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 279–296. Springer, Heidelberg (2010)
-
(2010)
AFRICACRYPT 2010. LNCS
, vol.6055
, pp. 279-296
-
-
Medwed, M.1
Standaert, F.-X.2
Grosschädl, J.3
Regazzoni, F.4
-
18
-
-
84866656094
-
Towards super-exponential sidechannel security with efficient leakage-resilient PRFs
-
In: Prouff, E., Schaumont, P. (eds.), Springer, Heidelberg
-
Medwed, M., Standaert, F.-X., Joux, A.: Towards super-exponential sidechannel security with efficient leakage-resilient PRFs. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 193–212. Springer, Heidelberg (2012)
-
(2012)
CHES 2012. LNCS
, vol.7428
, pp. 193-212
-
-
Medwed, M.1
Standaert, F.-X.2
Joux, A.3
-
20
-
-
84856034151
-
Cryptography from learning parity with noise
-
In: Bieliková, M., Friedrich, G., Gottlob, G., Katzenbeisser, S., Turán, G. (eds.), Springer, Heidelberg
-
Pietrzak, K.: Cryptography from learning parity with noise. In: Bieliková, M., Friedrich, G., Gottlob, G., Katzenbeisser, S., Turán, G. (eds.) SOFSEM 2012. LNCS, vol. 7147, pp. 99–114. Springer, Heidelberg (2012)
-
(2012)
SOFSEM 2012. LNCS
, vol.7147
, pp. 99-114
-
-
Pietrzak, K.1
-
21
-
-
80053552498
-
Information theoretic and security analysis of a 65-nanometer DDSLL AES S-Box
-
In: Preneel, B., Takagi, T. (eds.), Springer, Heidelberg
-
Renauld, M., Kamel, D., Standaert, F.-X., Flandre, D.: Information theoretic and security analysis of a 65-nanometer DDSLL AES S-Box. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 223–239. Springer, Heidelberg (2011)
-
(2011)
CHES 2011. LNCS
, vol.6917
, pp. 223-239
-
-
Renauld, M.1
Kamel, D.2
Standaert, F.-X.3
Flandre, D.4
-
22
-
-
27244432445
-
A Stochastic Model for Differential Side Channel Cryptanalysis
-
In: Rao, J. R., Sunar, B. (eds.), Springer, Heidelberg
-
Schindler, W., Lemke, K., Paar, C.: A Stochastic Model for Differential Side Channel Cryptanalysis. In: Rao, J. R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 30–46. Springer, Heidelberg (2005)
-
(2005)
CHES 2005. LNCS
, vol.3659
, pp. 30-46
-
-
Schindler, W.1
Lemke, K.2
Paar, C.3
-
23
-
-
0018714087
-
A T s
-
IEEE Computer Society, San Juan, Puerto Rico, 29–31 October
-
n) time/space tradeoff for certain np-complete problems. In: 20th Annual Symposium on Foundations of Computer Science, pp. 328–336. IEEE Computer Society, San Juan, Puerto Rico, 29–31 October (1979)
-
(1979)
20Th Annual Symposium on Foundations of Computer Science
, pp. 328-336
-
-
Schroeppel, R.1
Shamir, A.2
-
24
-
-
84937428040
-
A generalized birthday problem
-
In: Yung, M. (ed.), Springer, Heidelberg
-
Wagner, D.: A generalized birthday problem. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 288–303. Springer, Heidelberg (2002)
-
(2002)
CRYPTO 2002. LNCS
, vol.2442
, pp. 288-303
-
-
Wagner, D.1
|