-
1
-
-
84939573910
-
Differential power analysis
-
Springer-Verlag, Santa Barbara
-
Kocher P, Jaffe J, Jun B. Differential power analysis, Proceedings of the CRYPTO'99, LNCS 1666, Springer-Verlag, Santa Barbara, 1999; 388–397.
-
(1999)
Proceedings of the CRYPTO'99, LNCS 1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
2
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
Springer-Verlag, Konstanz, Germany
-
Boneh D, Demillo RA, Lipton RJ. On the importance of checking cryptographic protocols for faults, Proceedings of the EUROCRYPT'97, LNCS 1233, Springer-Verlag, Konstanz, Germany, 1997; 37–51.
-
(1997)
Proceedings of the EUROCRYPT'97, LNCS 1233
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.A.2
Lipton, R.J.3
-
3
-
-
51849097235
-
Bug attacks
-
Springer-Verlag, Santa Barbara
-
Biham E, Carmeli Y, Shamir A. Bug attacks, Proceedings of the CRYPTO'08, LNCS 5157, Springer-Verlag, Santa Barbara, 2008; 221–240.
-
(2008)
Proceedings of the CRYPTO'08, LNCS 5157
, pp. 221-240
-
-
Biham, E.1
Carmeli, Y.2
Shamir, A.3
-
4
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Springer-Verlag, Santa Barbara
-
Kocher PC. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, Proceedings of the CRYPTO'96, LNCS 1163, Springer-Verlag, Santa Barbara, 1996; 104–113.
-
(1996)
Proceedings of the CRYPTO'96, LNCS 1163
, pp. 104-113
-
-
Kocher, P.C.1
-
5
-
-
18844454571
-
Remote timing attacks are practical
-
Brumley D, Boneh D. Remote timing attacks are practical. Computer Networks. 2005; 48(5): 701–716.
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 701-716
-
-
Brumley, D.1
Boneh, D.2
-
6
-
-
78650832087
-
Leakage resilient elgamal encryption
-
Springer-Verlag, Singapore
-
Kiltz E, Pietrzak K. Leakage resilient elgamal encryption, Proceedings of the ASIACRYPT'10, LNCS 6477, Springer-Verlag, Singapore, 2010; 595–612.
-
(2010)
Proceedings of the ASIACRYPT'10, LNCS 6477
, pp. 595-612
-
-
Kiltz, E.1
Pietrzak, K.2
-
7
-
-
70350303869
-
Public-key cryptosystems resilient to key leakage
-
Springer-Verlag, Santa Barbara
-
Naor M, Segev G. Public-key cryptosystems resilient to key leakage, Proceedings of the CRYPTO'09, LNCS 5677, Springer-Verlag, Santa Barbara, 2009; 18–35.
-
(2009)
Proceedings of the CRYPTO'09, LNCS 5677
, pp. 18-35
-
-
Naor, M.1
Segev, G.2
-
8
-
-
77954650592
-
Public-key encryption in the bounded-retrieval model
-
Springer-Verlag, Monaco and Nice, French Riviera
-
Alwen J, Dodis Y, Naor M, Segev G, Walfish S, Wichs D. Public-key encryption in the bounded-retrieval model, Proceedings of the EUROCRYPT'10, LNCS6110, Springer-Verlag, Monaco and Nice, French Riviera, 2010; 113–134.
-
(2010)
Proceedings of the EUROCRYPT'10, LNCS6110
, pp. 113-134
-
-
Alwen, J.1
Dodis, Y.2
Naor, M.3
Segev, G.4
Walfish, S.5
Wichs, D.6
-
9
-
-
78650817944
-
Efficient public-key cryptography in the presence of key leakage
-
Springer-Verlag, Singapore
-
Dodis Y, Haralambiev K, Lopez-Alt A, Wichs D. Efficient public-key cryptography in the presence of key leakage, Proceedings of the ASIACRYPT'10, LNCS 6477, Springer-Verlag, Singapore, 2010; 613–631.
-
(2010)
Proceedings of the ASIACRYPT'10, LNCS 6477
, pp. 613-631
-
-
Dodis, Y.1
Haralambiev, K.2
Lopez-Alt, A.3
Wichs, D.4
-
10
-
-
78751478860
-
Cryptography resilient to continual memory leakage
-
Las Vegas
-
Brakerski Z, Kalai YT, Katz J, Vaikuntanathan V. Cryptography resilient to continual memory leakage, Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science, Las Vegas, 2010; 501–510.
-
(2010)
Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science
, pp. 501-510
-
-
Brakerski, Z.1
Kalai, Y.T.2
Katz, J.3
Vaikuntanathan, V.4
-
11
-
-
78650832087
-
Leakage resilient elgamal encryption
-
Springer-Verlag, Singapore
-
Kiltz E, Pietrzak K. Leakage resilient elgamal encryption, Proceedings of the ASIACRYPT'10, LNCS 6477, Springer-Verlag, Singapore, 2010; 595–612.
-
(2010)
Proceedings of the ASIACRYPT'10, LNCS 6477
, pp. 595-612
-
-
Kiltz, E.1
Pietrzak, K.2
-
12
-
-
78649985218
-
Practical leakage-resilient identity-based encryption from simple assumptions
-
Chicago
-
Chow SSM, Dodis Y, Rouselakis Y, Waters B. Practical leakage-resilient identity-based encryption from simple assumptions, Proceedings of the 17th ACM Conference on Computer and communications security, Chicago, 2010; 152–161.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and communications security
, pp. 152-161
-
-
Chow, S.S.M.1
Dodis, Y.2
Rouselakis, Y.3
Waters, B.4
-
13
-
-
84859970436
-
Identity-based encryption resilient to continual auxiliary leakage
-
Springer-Verlag, Cambridge, UK
-
Yuen TH, Chow SSM, Zhang Y, Yiu SM. Identity-based encryption resilient to continual auxiliary leakage, Proceedings of the EUROCRYPT'12, LNCS 7237, Springer-Verlag, Cambridge, UK, 2012; 117–134.
-
(2012)
Proceedings of the EUROCRYPT'12, LNCS 7237
, pp. 117-134
-
-
Yuen, T.H.1
Chow, S.S.M.2
Zhang, Y.3
Yiu, S.M.4
-
14
-
-
72449205531
-
Signature schemes with bounded leakage resilience
-
Springer-Verlag, Tokyo, Japan
-
Katz J, Vaikuntanathan V. Signature schemes with bounded leakage resilience, Proceedings of the ASIACRYPT'09, LNCS 5912, Springer-Verlag, Tokyo, Japan, 2009; 703–720.
-
(2009)
Proceedings of the ASIACRYPT'09, LNCS 5912
, pp. 703-720
-
-
Katz, J.1
Vaikuntanathan, V.2
-
16
-
-
70350340328
-
Leakage-resilient public-key cryptography in the bounded-retrieval model
-
Springer-Verlag, Santa Barbara
-
Alwen J, Dodis Y, Wichs D. Leakage-resilient public-key cryptography in the bounded-retrieval model, Proceedings of the CRYPTO'09, LNCS 5677, Springer-Verlag, Santa Barbara, 2009; 36–54.
-
(2009)
Proceedings of the CRYPTO'09, LNCS 5677
, pp. 36-54
-
-
Alwen, J.1
Dodis, Y.2
Wichs, D.3
-
17
-
-
79957971998
-
Fully leakage-resilient signatures
-
Springer-Verlag, Tallinn, Estonia
-
Boyle E, Segev G, Wichs D. Fully leakage-resilient signatures, Proceedings of the EUROCRYPT'11, LNCS 6632, Springer-Verlag, Tallinn, Estonia, 2011; 89–108.
-
(2011)
Proceedings of the EUROCRYPT'11, LNCS 6632
, pp. 89-108
-
-
Boyle, E.1
Segev, G.2
Wichs, D.3
-
18
-
-
77949631657
-
Leakage-resilient signatures
-
Springer-Verlag, Zurich, Switzerland
-
Faust S, Kiltz E, Pietrzak K, Rothblum GN. Leakage-resilient signatures, Proceedings of the TCC'10, LNCS 5978, Springer-Verlag, Zurich, Switzerland, 2010; 343–360.
-
(2010)
Proceedings of the TCC'10, LNCS 5978
, pp. 343-360
-
-
Faust, S.1
Kiltz, E.2
Pietrzak, K.3
Rothblum, G.N.4
-
19
-
-
79953188689
-
Signatures resilient to continual leakage on memory and computation
-
Springer-Verlag, Providence, Rhode Island
-
Malkin T, Teranishi I, Vahlis Y, Yung M. Signatures resilient to continual leakage on memory and computation, Proceedings of the TCC'11, LNCS 6597, Springer-Verlag, Providence, Rhode Island, 2011; 89–106.
-
(2011)
Proceedings of the TCC'11, LNCS 6597
, pp. 89-106
-
-
Malkin, T.1
Teranishi, I.2
Vahlis, Y.3
Yung, M.4
-
20
-
-
84872519992
-
A practical leakage-resilient Signature scheme in the generic group model
-
Springer-Verlag, Burnaby, Canada
-
Galindo D, Virek S. A practical leakage-resilient Signature scheme in the generic group model, Proceedings of the Selected Areas in Cryptography, LNCS 7707, Springer-Verlag, Burnaby, Canada, 2013; 50–65.
-
(2013)
Proceedings of the Selected Areas in Cryptography, LNCS 7707
, pp. 50-65
-
-
Galindo, D.1
Virek, S.2
-
21
-
-
84871587528
-
Signature schemes secure against hard-to-invert leakage
-
Springer-Verlag, Beijing, China
-
Faust S, Hazay C, Nielsen JB, Nordholt PS, Zottarel A. Signature schemes secure against hard-to-invert leakage, Proceedings of the ASIACRYPT'12, LNCS 7658, Springer-Verlag, Beijing, China, 2012; 98–115.
-
(2012)
Proceedings of the ASIACRYPT'12, LNCS 7658
, pp. 98-115
-
-
Faust, S.1
Hazay, C.2
Nielsen, J.B.3
Nordholt, P.S.4
Zottarel, A.5
-
22
-
-
84901679767
-
Efficient leakage-resilient signature schemes in the generic bilinear group model
-
Springer-Verlag, Fuzhou, China
-
Tang F, Li H, Niu Q, Liang B. Efficient leakage-resilient signature schemes in the generic bilinear group model, Proceedings of the Information Security Practice and Experience, LNCS 8434, Springer-Verlag, Fuzhou, China, 2014; 418–432.
-
(2014)
Proceedings of the Information Security Practice and Experience, LNCS 8434
, pp. 418-432
-
-
Tang, F.1
Li, H.2
Niu, Q.3
Liang, B.4
-
23
-
-
78751485079
-
Cryptography against continuous memory attacks
-
Las Vegas
-
Dodis Y, Haralambiev K, Lopez-Alt A, Wichs D. Cryptography against continuous memory attacks, Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science, Las Vegas, 2010; 511–520.
-
(2010)
Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science
, pp. 511-520
-
-
Dodis, Y.1
Haralambiev, K.2
Lopez-Alt, A.3
Wichs, D.4
-
24
-
-
24944562007
-
Hierarchical identity-based encryption with constant size ciphertext
-
Springer-Verlag, Aarhus, Denmark
-
Boneh D, Boyen X, Goh EJ. Hierarchical identity-based encryption with constant size ciphertext, Proceedings of the EUROCRYPT'05, LNCS 3494, Springer-Verlag, Aarhus, Denmark, 2005; 440–456.
-
(2005)
Proceedings of the EUROCRYPT'05, LNCS 3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.J.3
-
25
-
-
0031619016
-
The random oracle methodology, revisited (preliminary version)
-
Dallas
-
Canetti R, Goldreich O, Halevi S. The random oracle methodology, revisited (preliminary version), Proceedings of the STOC'98, Dallas, 1998; 209–218.
-
(1998)
Proceedings of the STOC'98
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
26
-
-
35048832490
-
An uninstantiable random-oracle-model scheme for a hybrid-encryption problem
-
Springer-Verlag, Interlaken, Switzerland
-
Bellare M, Boldyreva A, Palacio A. An uninstantiable random-oracle-model scheme for a hybrid-encryption problem, Proceedings of the EUROCRYPT'04, LNCS 3027, Springer-Verlag, Interlaken, Switzerland, 2004; 171–188.
-
(2004)
Proceedings of the EUROCRYPT'04, LNCS 3027
, pp. 171-188
-
-
Bellare, M.1
Boldyreva, A.2
Palacio, A.3
-
27
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer-Verlag, Santa Barbara
-
Shamir A. Identity-based cryptosystems and signature schemes, Proceedings of the CRYPTO'84, LNCS 196, Springer-Verlag, Santa Barbara, 1984; 47–53.
-
(1984)
Proceedings of the CRYPTO'84, LNCS 196
, pp. 47-53
-
-
Shamir, A.1
-
28
-
-
35048841300
-
Efficient selective-ID secure identity-based encryption without random oracles
-
Springer-Verlag, Interlaken, Switzerland
-
Boneh D, Boyen X. Efficient selective-ID secure identity-based encryption without random oracles, Proceedings of the EUROCRYPT'04, LNCS 3027, Springer-Verlag, Interlaken, Switzerland, 2004; 223–238.
-
(2004)
Proceedings of the EUROCRYPT'04, LNCS 3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
29
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Springer-Verlag, Aarhus, Denmark
-
Waters B. Efficient identity-based encryption without random oracles, Proceedings of the EUROCRYPT'05, LNCS 3494, Springer-Verlag, Aarhus, Denmark, 2005; 114–127.
-
(2005)
Proceedings of the EUROCRYPT'05, LNCS 3494
, pp. 114-127
-
-
Waters, B.1
-
30
-
-
77949581448
-
New techniques for dual system encryption and fully secure HIBE with short ciphertexts
-
Springer-Verlag, Zurich, Switzerland
-
Lewko AB, Waters B. New techniques for dual system encryption and fully secure HIBE with short ciphertexts, Proceedings of the TCC'10, LNCS 5978, Springer-Verlag, Zurich, Switzerland, 2010; 455–479.
-
(2010)
Proceedings of the TCC'10, LNCS 5978
, pp. 455-479
-
-
Lewko, A.B.1
Waters, B.2
-
31
-
-
79953164949
-
Achieving leakage resilience through dual system encryption
-
Springer-Verlag, Providence, Rhode Island
-
Lewko AB, Rouselakis Y, Waters B. Achieving leakage resilience through dual system encryption, Proceedings of the TCC'11, LNCS 6597, Springer-Verlag, Providence, Rhode Island, 2011; 70–88.
-
(2011)
Proceedings of the TCC'11, LNCS 6597
, pp. 70-88
-
-
Lewko, A.B.1
Rouselakis, Y.2
Waters, B.3
-
32
-
-
83755180826
-
On the efficient implementation of pairing-based protocols
-
Springer-Verlag, Oxford, UK
-
Scott M. On the efficient implementation of pairing-based protocols, Proceedings of the Cryptography and Coding, LNCS 7089, Springer-Verlag, Oxford, UK, 2011; 296–308.
-
(2011)
Proceedings of the Cryptography and Coding, LNCS 7089
, pp. 296-308
-
-
Scott, M.1
-
33
-
-
84982798783
-
Implementation of a leakage-resilient ElGamal key encapsulation mechanism
-
Article 2016; 1-10
-
Galindo D, Grobschadl J, Liu Z, Vadnala PK, Vivek S. Implementation of a leakage-resilient ElGamal key encapsulation mechanism. Journal of Cryptographic Engineering. Article DOI:10.1007/s13389-016-0121-x, 2016; 1-10.
-
Journal of Cryptographic Engineering
-
-
Galindo, D.1
Grobschadl, J.2
Liu, Z.3
Vadnala, P.K.4
Vivek, S.5
-
34
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
Springer-Verlag, Konstanz, Germany
-
Shoup V. Lower bounds for discrete logarithms and related problems, Proceedings of the EUROCRYPT'97, LNCS 1233, Springer-Verlag, Konstanz, Germany, 1997; 256–266.
-
(1997)
Proceedings of the EUROCRYPT'97, LNCS 1233
, pp. 256-266
-
-
Shoup, V.1
-
35
-
-
52149117439
-
Fuzzy extractors: how to generate strong keys from biometrics and other noisy data
-
Dodis Y, Ostrovsky R, Reyzin L, Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing. 2008; 38(1): 97–139.
-
(2008)
SIAM Journal on Computing
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
36
-
-
84976779342
-
Fast probabilistic algorithms for verification of polynomial identities
-
Schwartz JT. Fast probabilistic algorithms for verification of polynomial identities. Journal of the ACM. 1980; 27(4): 701–717.
-
(1980)
Journal of the ACM
, vol.27
, Issue.4
, pp. 701-717
-
-
Schwartz, J.T.1
-
37
-
-
84925463455
-
Probabilistic algorithms for sparse polynomials
-
Springer-Verlag, Marseille, France
-
Zippel R. Probabilistic algorithms for sparse polynomials, Proceedings of the EUROSAM'79, LNCS 72, Springer-Verlag, Marseille, France, 1979; 216–226.
-
(1979)
Proceedings of the EUROSAM'79, LNCS 72
, pp. 216-226
-
-
Zippel, R.1
|