11573/1673701 - 2022 -
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free Brian, G.; Faonio, A.; Obremski, M.; Ribeiro, J.; Simkin, M.; Skorski, M.; Venturi, D. - 01a Articolo in rivista
paper: IEEE TRANSACTIONS ON INFORMATION THEORY (IEEE / Institute of Electrical and Electronics Engineers Incorporated:445 Hoes Lane:Piscataway, NJ 08854:(800)701-4333, (732)981-0060, EMAIL: subscription-service@ieee.org, INTERNET: http://www.ieee.org, Fax: (732)981-9667) pp. 8197-8227 - issn: 0018-9448 - wos: WOS:000891796100029 (1) - scopus: 2-s2.0-85135765130 (1)
11573/1673698 - 2022 -
Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited Brian, G.; Faonio, A.; Ribeiro, J.; Venturi, D. - 01a Articolo in rivista
paper: IACR TRANSACTION ON SYMMETRIC CRYPTOLOGY (Bochum: International Association for Cryptologic Research) pp. 1-19 - issn: 2519-173X - wos: WOS:000869410400001 (1) - scopus: 2-s2.0-85137697222 (2)
11573/1673696 - 2022 -
Continuously Non-malleable Codes Against Bounded-Depth Tampering Brian, Gianluca; Faust, Sebastian; Micheli, Elena; Venturi, Daniele - 04b Atto di convegno in volume
conference: 28th Annual International Conference on the Theory and Application of Cryptology and Information Security (Taipei)
book: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) - (978-3-031-22971-8; 978-3-031-22972-5)
11573/1575150 - 2021 -
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free Brian, G.; Faonio, A.; Obremski, M.; Ribeiro, J.; Simkin, M.; Skorski, M.; Venturi, D. - 04b Atto di convegno in volume
conference: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2021 (hrv)
book: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) - (978-3-030-77885-9; 978-3-030-77886-6)
11573/1618013 - 2021 -
Continuously Non-malleable Secret Sharing: Joint Tampering, Plain Model and Capacity Brian, G.; Faonio, A.; Venturi, D. - 04b Atto di convegno in volume
conference: 19th International Conference on Theory of Cryptography, TCC 2021 (usa)
book: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) - (978-3-030-90452-4; 978-3-030-90453-1)
11573/1469643 - 2020 -
Non-malleable secret sharing against bounded joint-tampering attacks in the plain model Brian, G.; Faonio, A.; Obremski, M.; Simkin, M.; Venturi, D. - 04b Atto di convegno in volume
conference: 40th Annual International Cryptology Conference, CRYPTO 2020 (usa)
book: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) - (978-3-030-56876-4; 978-3-030-56877-1)
11573/1356500 - 2019 -
Continuously Non-malleable Secret Sharing for General Access Structures Brian, G.; Faonio, A.; Venturi, D. - 04b Atto di convegno in volume
conference: 17th International Conference on Theory of Cryptography, TCC 2019 (Nuremberg; Germany)
book: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) - (978-3-030-36032-0; 978-3-030-36033-7)