Search results for: Daniel Wichs
Algorithmica > 2017 > 79 > 4 > 1353-1373
IEEE Transactions on Information Theory > 2016 > 62 > 12 > 7179 - 7194
Algorithmica > 2017 > 79 > 4 > 1196-1232
Lecture Notes in Computer Science > Advances in Cryptology - CRYPTO 2009 > Secret Sharing and Secure Computation > 505-523
Lecture Notes in Computer Science > Advances in Cryptology – EUROCRYPT 2010 > Obfuscation and Side Channel Security > 113-134
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2011 > Leakage and Side Channels > 335-353
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2010 > Public-Key Encryption > 613-631
Lecture Notes in Computer Science > Information Theoretic Security > Leakage Resilient Cryptography > 1-18
Lecture Notes in Computer Science > Advances in Cryptology – EUROCRYPT 2011 > Implementation and Side Channels > 89-108
Journal of Cryptology > 2016 > 29 > 3 > 514-551
computational complexity > 2016 > 25 > 3 > 567-605
Journal of Cryptology > 2017 > 30 > 1 > 22-57