TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 8.

Damgard, Ivan and Faust, Sebastian and Mukherjee, Pratyay and Venturi, Daniele (2017):
Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier.
In: J. Cryptology, 30 (1), pp. 152-190. DOI: 10.1007/s00145-015-9218-0,
[Article]

Damgard, Ivan and Faust, Sebastian and Mukherjee, Pratyay and Venturi, Daniele (2015):
The Chaining Lemma and Its Application.
pp. 181-196, Information Theoretic Security - 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings, DOI: 10.1007/978-3-319-17470-9₁₁,
[Conference or Workshop Item]

Andrychowicz, Marcin and Damgard, Ivan and Dziembowski, Stefan and Faust, Sebastian and Polychroniadou, Antigoni (2015):
Efficient Leakage Resilient Circuit Compilers.
pp. 311-329, Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings, DOI: 10.1007/978-3-319-16715-2₁₇,
[Conference or Workshop Item]

Damgard, Ivan and Faust, Sebastian and Mukherjee, Pratyay and Venturi, Daniele (2014):
The Chaining Lemma and its application.
In: IACR Cryptology ePrint Archive, 2014, p. 979. [Article]

Damgard, Ivan and Faust, Sebastian and Mukherjee, Pratyay and Venturi, Daniele (2013):
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier.
pp. 140-160, Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II, DOI: 10.1007/978-3-642-42045-0₈,
[Conference or Workshop Item]

Damgard, Ivan and Faust, Sebastian and Mukherjee, Pratyay and Venturi, Daniele (2013):
Bounded Tamper Resilience: How to go beyond the Algebraic Barrier.
In: IACR Cryptology ePrint Archive, 2013, p. 677. [Article]

Damgard, Ivan and Faust, Sebastian and Hazay, Carmit (2012):
Secure Two-Party Computation with Low Communication.
pp. 54-74, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, DOI: 10.1007/978-3-642-28914-9₄,
[Conference or Workshop Item]

Damgard, Ivan and Faust, Sebastian and Hazay, Carmit (2011):
Secure Two-Party Computation with Low Communication.
In: IACR Cryptology ePrint Archive, 2011, p. 508. [Article]

This list was generated on Tue Mar 2 00:49:25 2021 CET.