Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
19
views
10
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,207
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – EUROCRYPT 2021 : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part II
Mind the Middle Layer: The HADES Design Strategy Revisited
other
Author(s):
Nathan Keller
,
Asaf Rosemarin
Publication date
(Online):
June 16 2021
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Islamic and Middle Eastern Studies
Most cited references
10
Record
: found
Abstract
: not found
Article
: not found
Determinants of Block Matrices
John R. Silvester
(2000)
0
comments
Cited
50
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book
: not found
Gröbner Bases
Thomas Becker
,
Volker Weispfenning
(1993)
0
comments
Cited
34
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Block Ciphers That Are Easier to Mask: How Far Can We Go?
B Gerard
,
Vincent G. Grosso
,
M. Naya-Plasencia
…
(2013)
0
comments
Cited
16
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2021
Publication date (Online):
June 16 2021
Pages
: 35-63
DOI:
10.1007/978-3-030-77886-6_2
SO-VID:
f4c74fbd-6291-4626-bd2f-15661bd8fb1e
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
pp. 35
Mind the Middle Layer: The HADES Design Strategy Revisited
pp. 64
Password Hashing and Preprocessing
pp. 92
Compactness of Hashing Modes and Efficiency Beyond Merkle Tree
pp. 127
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3
pp. 155
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2
pp. 187
Pre-computation Scheme of Window \(\tau \)NAF for Koblitz Curves Revisited
pp. 219
Dummy Shuffling Against Algebraic Attacks in White-Box Implementations
pp. 249
Advanced Lattice Sieving on GPUs, with Tensor Cores
pp. 283
Fast Verification of Masking Schemes in Characteristic Two
pp. 313
On the Power of Expansion: More Efficient Constructions in the Random Probing Model
pp. 344
Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages
pp. 377
Leakage Resilient Value Comparison with Application to Message Authentication
pp. 408
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free
pp. 438
Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem
pp. 468
Multi-source Non-malleable Extractors and Applications
pp. 501
Secure Software Leasing
pp. 531
Oblivious Transfer Is in MiniQCrypt
pp. 562
Security Analysis of Quantum Lightning
pp. 568
Classical vs Quantum Random Oracles
pp. 598
On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work
pp. 630
Classical Proofs of Quantum Knowledge
pp. 663
Order-C Secure Multiparty Computation for Highly Repetitive Circuits
pp. 694
The More the Merrier: Reducing the Cost of Large Scale MPC
pp. 724
Multiparty Reusable Non-interactive Secure Computation from LWE
pp. 754
Unbounded Multi-party Computation from Learning with Errors
pp. 782
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation
pp. 812
Constant-Overhead Unconditionally Secure Multiparty Computation Over Binary Fields
pp. 842
Breaking the Circuit Size Barrier for Secure Computation Under Quasi-Polynomial LPN
pp. 871
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation
pp. 901
VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE
Similar content
1,207
Excavation induced fractures in a plastic clay formation: Observations at the HADES URF
Authors:
Philippe Van Marcke
,
Wim Bastiaens
The HADES RPC inner TOF wall
Authors:
D. Belver
,
A. Blanco
,
P. Cabanelas
…
Diamonds as timing detectors for minimum-ionizing particles The HADES proton-beam monitor and START signal detectors for time of flight measurements
Authors:
J. Pietraszko
,
L. Fabbietti
,
W. KOENIG
…
See all similar