Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
32
views
24
references
Top references
cited by
27
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,032
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – ASIACRYPT 2009
Signature Schemes with Bounded Leakage Resilience
other
Author(s):
Jonathan Katz
,
Vinod Vaikuntanathan
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
24
Record
: found
Abstract
: not found
Book Chapter
: not found
Private Circuits: Securing Hardware against Probing Attacks
Yuval Ishai
,
Amit Sahai
,
David N Wagner
(2003)
0
comments
Cited
112
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
On the Importance of Checking Cryptographic Protocols for Faults
Dan Boneh
,
Richard Demillo
,
Richard Lipton
(1997)
0
comments
Cited
80
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
François-Xavier Standaert
,
Tal G. Malkin
,
Moti Yung
(2009)
0
comments
Cited
73
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 703-720
DOI:
10.1007/978-3-642-10366-7_41
SO-VID:
389aeaa8-e739-4652-a506-c2dde4c1a8c3
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Related-Key Cryptanalysis of the Full AES-192 and AES-256
pp. 542
Improved Cryptanalysis of Skein
pp. 37
Cascade Encryption Revisited
pp. 126
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
pp. 179
Group Encryption: Non-interactive Realization in the Standard Model
pp. 232
Hedged Public-Key Encryption: How to Protect against Bad Randomness
pp. 319
Proofs of Storage from Homomorphic Identification Protocols
pp. 334
Simple Adaptive Oblivious Transfer without Random Oracle
pp. 505
Security Notions and Generic Constructions for Client Puzzles
pp. 524
Foundations of Non-malleable Hash and One-Way Functions
pp. 617
Efficient Public Key Encryption Based on Ideal Lattices
pp. 636
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
pp. 685
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
pp. 703
Signature Schemes with Bounded Leakage Resilience
Similar content
1,032
Cement leakage and filling pattern study of low viscous vertebroplastic versus high viscous confidence cement
Authors:
Sfar Mohamed Habib
,
Hassan Serhan
,
Connie Marchek
…
Compression of the Lateral Antebrachial Cutaneous Nerve due to Leakage of Iron after an Intravenous Iron Infusion
Authors:
Soyoung Kwak
,
Min Cheol Chang
The assessment of perioperative risk factors of anastomotic leakage after intestinal surgeries; a prospective study
Authors:
Selmy Awad
,
Ahmed El-Rahman
,
Ashraf Abbas
…
See all similar
Cited by
27
Introduction to differential power analysis
Authors:
Paul Köcher
,
Joshua Jaffe
,
Benjamin Jun
…
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
Authors:
Sebastian Faust
,
Tal Rabin
,
Leonid Reyzin
…
Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
Authors:
Alexandre Duc
,
Stefan Dziembowski
,
Sebastian Faust
See all cited by