Author of the publication

Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes.

, , and . IACR Cryptology ePrint Archive, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Silent Simon: A threshold implementation under 100 slices., , and . HOST, page 1-6. IEEE Computer Society, (2015)Algorithms for Reconstructing Databases and Cryptographic Secret Keys in Entropic Settings.. University of Maryland, College Park, MD, USA, (2022)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/28740).Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite., , and . USENIX Security Symposium, page 1019-1035. USENIX Association, (2021)Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince., , , and . Financial Cryptography Workshops, volume 8438 of Lecture Notes in Computer Science, page 208-220. Springer, (2014)Balanced Encoding to Mitigate Power Analysis: A Case Study., , , and . CARDIS, volume 8968 of Lecture Notes in Computer Science, page 49-63. Springer, (2014)Towards a Ring Analogue of the Leftover Hash Lemma., , , and . J. Math. Cryptol., 15 (1): 87-110 (2021)Lightweight Side Channel Resistance: Threshold Implementations of Simon., , and . IEEE Trans. Computers, 66 (4): 661-671 (2017)BKW Meets Fourier New Algorithms for LPN with Sparse Parities., , , and . TCC (2), volume 13043 of Lecture Notes in Computer Science, page 658-688. Springer, (2021)On the Leakage Resilience of Ideal-Lattice Based Public Key Encryption., , , and . IACR Cryptology ePrint Archive, (2017)Tight upper and lower bounds for leakage-resilient, locally decodable and updatable non-malleable codes., , and . Inf. Comput., (2019)