Author of the publication

Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis.

, , , , , , , and . IACR Cryptology ePrint Archive, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis., , , , , , , and . J. Cryptographic Engineering, 4 (3): 157-171 (2014)Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model., , , , and . ICETE (Selected Papers), volume 554 of Communications in Computer and Information Science, page 363-379. Springer, (2014)Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model., , , , and . SECRYPT, page 230-241. SciTePress, (2013)Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?, , and . IACR Cryptology ePrint Archive, (2014)Verified Proofs of Higher-Order Masking., , , , , and . EUROCRYPT (1), volume 9056 of Lecture Notes in Computer Science, page 457-485. Springer, (2015)Masking the GLP Lattice-Based Signature Scheme at Any Order., , , , , , and . EUROCRYPT (2), volume 10821 of Lecture Notes in Computer Science, page 354-384. Springer, (2018)Randomness Complexity of Private Circuits for Multiplication., , , , , and . EUROCRYPT (2), volume 9666 of Lecture Notes in Computer Science, page 616-648. Springer, (2016)GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited., , , , , and . CCS, page 2147-2164. ACM, (2019)Leakage-Resilient Symmetric Encryption via Re-keying., , and . CHES, volume 8086 of Lecture Notes in Computer Science, page 471-488. Springer, (2013)Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference & Automated Optimizations., , , , , , and . IACR Cryptology ePrint Archive, (2018)