Zobrazeno 1 - 10
of 68
pro vyhledávání: '"Stefan Dziembowski"'
Autor:
Krzysztof Pietrzak, Małgorzata Gałązka, Stefan Dziembowski, Michelle Yeo, Suvradip Chakraborty, Tomasz Lizurej
Publikováno v:
Theory of Cryptography ISBN: 9783030904524
TCC (2)
TCC (2)
Digital hardware Trojans are integrated circuits whose implementation differ from the specification in an arbitrary and malicious way. For example, the circuit can differ from its specified input/output behavior after some fixed number of queries (kn
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::12da314e75f5325e497230c784888c68
https://doi.org/10.1007/978-3-030-90453-1_14
https://doi.org/10.1007/978-3-030-90453-1_14
Publikováno v:
Advances in Cryptology – CRYPTO 2020 ISBN: 9783030568795
CRYPTO (2)
Advances in Cryptology – CRYPTO 2020-40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – CRYPTO 2020
CRYPTO (2)
Advances in Cryptology – CRYPTO 2020-40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – CRYPTO 2020
Reverse firewalls were introduced at Eurocrypt 2015 by Miro-nov and Stephens-Davidowitz, as a method for protecting cryptographic protocols against attacks on the devices of the honest parties. In a nutshell: a reverse firewall is placed outside of a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::dd76b5ba523ae75a77d57ea1d5dc615e
https://doi.org/10.1007/978-3-030-56880-1_26
https://doi.org/10.1007/978-3-030-56880-1_26
Publikováno v:
Advances in Cryptology – EUROCRYPT 2014 ISBN: 9783642552199
EUROCRYPT
EUROCRYPT
A recent trend in cryptography is to formally show the leakage resilience of cryptographic implementations in a given leakage model. One of the most prominent leakage model—the so-called bounded leakage model—assumes that the amount of leakage th
Publikováno v:
Information Processing Letters. 134:62-66
The classical Shannon's entropy possesses a natural definition of conditional entropy and a useful chain rule whose application is ubiquitous in information theory. On the contrary, for the case of min-entropy both: the definition of conditional min-
Autor:
Orr Dunkelman, Stefan Dziembowski
The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 M
Publikováno v:
IEEE Symposium on Security and Privacy
Payment channels emerged recently as an efficient method for performing cheap micropayments in cryptocurrencies. In contrast to traditional on-chain transactions, payment channels have the advantage that they allow for nearly unlimited number of tran
Publikováno v:
Advances in Cryptology – EUROCRYPT 2019 ISBN: 9783030176525
EUROCRYPT (1)
EUROCRYPT (1)
Smart contracts are self-executing agreements written in program code and are envisioned to be one of the main applications of blockchain technology. While they are supported by prominent cryptocurrencies such as Ethereum, their further adoption is h
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2775b070a05d3688c8ad224e988804ef
https://doi.org/10.1007/978-3-030-17653-2_21
https://doi.org/10.1007/978-3-030-17653-2_21
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030346171
ASIACRYPT (3)
ASIACRYPT (3)
Masking schemes are a prominent countermeasure against power analysis and work by concealing the values that are produced during the computation through randomness. The randomness is typically injected into the masked algorithm using a so-called refr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e036c644df3f04e7ba87c812c39aed70
https://doi.org/10.1007/978-3-030-34618-8_11
https://doi.org/10.1007/978-3-030-34618-8_11
Publikováno v:
2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014
IEEE Symposium on Security and Privacy
IEEE Symposium on Security and Privacy
Bit coin is a decentralized digital currency, introduced in 2008, that has recently gained noticeable popularity. Its main features are: (a) it lacks a central authority that controls the transactions, (b) the list of transactions is publicly availab
Publikováno v:
CCS
One of the fundamental challenges that hinder further adaption of decentralized cryptocurrencies is scalability. Because current cryptocurrencies require that all transactions are processed and stored on a distributed ledger -- the so-called blockcha