Search results for: Stefan Dziembowski
Journal of Cryptology > 2019 > 32 > 1 > 151-177
Lecture Notes in Computer Science > Security and Cryptography for Networks > Side Channel Attacks and Leakage Resilience > 121-137
Lecture Notes in Computer Science > Advances in Cryptology - EUROCRYPT 2004 > Unconditional Security > 126-137
Lecture Notes in Computer Science > Information Theoretic Security > Leakage Resilient Cryptography > 19-26
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2011 > Leakage and Side Channels > 335-353
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT 2001 > Multiparty Protocols > 262-279
Lecture Notes in Computer Science > Security and Cryptography for Networks > Cryptographic Protocols I > 200-218
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’99 > Distributed Cryptography > 311-326
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2011 > Leakage Resilient Cryptography > 702-721
2014 IEEE Symposium on Security and Privacy > 443 - 458
Journal of Cryptology > 2004 > 17 > 3 > 153-207
Journal of Cryptology > 2004 > 17 > 1 > 5-26