TU Darmstadt / ULB / TUbiblio

Blättern nach Person

Ebene hoch
Exportieren als [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Gruppiere nach: Keine Gruppierung | Typ des Eintrags | Publikationsjahr | Sprache
Anzahl der Einträge: 14.

Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2017)
Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier.
In: J. Cryptology, 30 (1)
doi: 10.1007/s00145-015-9218-0
Artikel, Bibliographie

Faust, Sebastian ; Hostakova, Kristina ; Mukherjee, Pratyay ; Venturi, Daniele (2017)
Non-Malleable Codes for Space-Bounded Tampering.
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II.
doi: 10.1007/978-3-319-63715-0_4
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Hostakova, Kristina ; Mukherjee, Pratyay ; Venturi, Daniele (2017)
Non-Malleable Codes for Space-Bounded Tampering.
In: IACR Cryptology ePrint Archive, 2017
Artikel, Bibliographie

Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele ; Wichs, Daniel (2016)
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits.
In: IEEE Trans. Information Theory, 62 (12)
doi: 10.1109/TIT.2016.2613919
Artikel, Bibliographie

Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2015)
The Chaining Lemma and Its Application.
Information Theoretic Security - 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings.
doi: 10.1007/978-3-319-17470-9_11
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2015)
A Tamper and Leakage Resilient von Neumann Architecture.
Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings.
doi: 10.1007/978-3-662-46447-2_26
Konferenzveröffentlichung, Bibliographie

Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2014)
The Chaining Lemma and its application.
In: IACR Cryptology ePrint Archive, 2014
Artikel, Bibliographie

Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2014)
Continuous Non-malleable Codes.
Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings.
doi: 10.1007/978-3-642-54242-8_20
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2014)
Continuous Non-malleable Codes.
In: IACR Cryptology ePrint Archive, 2014
Artikel, Bibliographie

Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele ; Wichs, Daniel (2014)
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits.
Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings.
doi: 10.1007/978-3-642-55220-5_7
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2014)
A Tamper and Leakage Resilient Random Access Machine.
In: IACR Cryptology ePrint Archive, 2014
Artikel, Bibliographie

Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2013)
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier.
Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II.
doi: 10.1007/978-3-642-42045-0_8
Konferenzveröffentlichung, Bibliographie

Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2013)
Bounded Tamper Resilience: How to go beyond the Algebraic Barrier.
In: IACR Cryptology ePrint Archive, 2013
Artikel, Bibliographie

Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele ; Wichs, Daniel (2013)
Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits.
In: IACR Cryptology ePrint Archive, 2013
Artikel, Bibliographie

Diese Liste wurde am Tue Dec 17 04:31:15 2024 CET generiert.