Author:
Bogdanov Andrej,Ishai Yuval,Srinivasan Akshayaram
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference44 articles.
1. M. Ajtai, Secure computation with information leaking to an adversary, in Proceedings of the 43rd ACM Symposium on Theory of Computing, STOC 2011, (San Jose, CA, USA, 2011) 6-8 June 2011. pp. 715–724, https://doi.org/10.1145/1993636.1993731
2. A. Akavia, A. Bogdanov, S. Guo, A. Kamath, A. Rosen, Candidate weak pseudorandom functions in AC$$^0$$$$o$$ MOD$$_2$$, in Naor, M. (ed.) ITCS 2014. pp. 251–260. ACM (Jan 2014)
3. P. Ananth, Y. Ishai, A. Sahai, Private circuits: A modular approach, in Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part III. pp. 427–455 (2018)
4. A. Battistello, J.S. Coron, E. Prouff, R. Zeitoun, Horizontal side-channel attacks and countermeasures on the ISW masking scheme, in Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 23–39. (Springer, Heidelberg, Aug 2016)
5. S. Belaïd, F. Benhamouda, A. Passelègue, E. Prouff, A. Thillard, D. Vergnaud, Randomness complexity of private circuits for multiplication, in Fischlin, M., Coron, J.S. (eds.) EUROCRYPT 2016, Part II. LNCS, vol. 9666, pp. 616–648. Springer, Heidelberg (May 2016)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献