Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model. Barthe, G., Dupressoir, F., Faust, S., Grégoire, B., Standaert, F., & Strub, P. In Coron, J. & Nielsen, J. B., editors, Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part I, volume 10210, of Lecture Notes in Computer Science, pages 535–566, 2017.
Paper doi bibtex @inproceedings{DBLP:conf/eurocrypt/BartheDFGSS17,
author = {Gilles Barthe and Fran{\c{c}}ois Dupressoir and
Sebastian Faust and Benjamin Gr{\'{e}}goire and
Fran{\c{c}}ois{-}Xavier Standaert and
Pierre{-}Yves Strub},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/eurocrypt/BartheDFGSS17.bib},
booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th
Annual International Conference on the Theory and
Applications of Cryptographic Techniques, Paris,
France, April 30 - May 4, 2017, Proceedings, Part
{I}},
doi = {10.1007/978-3-319-56620-7\_19},
editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen},
isbn = {978-3-319-56619-1},
pages = {535--566},
series = {Lecture Notes in Computer Science},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
title = {Parallel Implementations of Masking Schemes and the
Bounded Moment Leakage Model},
url = {https://doi.org/10.1007/978-3-319-56620-7\_19},
volume = {10210},
year = {2017}
}
Downloads: 0
{"_id":"CNJAhHhgFwZ6o9XyX","bibbaseid":"barthe-dupressoir-faust-grgoire-standaert-strub-parallelimplementationsofmaskingschemesandtheboundedmomentleakagemodel-2017","downloads":0,"creationDate":"2017-04-18T16:31:35.847Z","title":"Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model","author_short":["Barthe, G.","Dupressoir, F.","Faust, S.","Grégoire, B.","Standaert, F.","Strub, P."],"year":2017,"bibtype":"inproceedings","biburl":"http://www.strub.nu/biblio/strub.bib","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Gilles"],"propositions":[],"lastnames":["Barthe"],"suffixes":[]},{"firstnames":["François"],"propositions":[],"lastnames":["Dupressoir"],"suffixes":[]},{"firstnames":["Sebastian"],"propositions":[],"lastnames":["Faust"],"suffixes":[]},{"firstnames":["Benjamin"],"propositions":[],"lastnames":["Grégoire"],"suffixes":[]},{"firstnames":["François-Xavier"],"propositions":[],"lastnames":["Standaert"],"suffixes":[]},{"firstnames":["Pierre-Yves"],"propositions":[],"lastnames":["Strub"],"suffixes":[]}],"bibsource":"dblp computer science bibliography, https://dblp.org","biburl":"https://dblp.org/rec/conf/eurocrypt/BartheDFGSS17.bib","booktitle":"Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part I","doi":"10.1007/978-3-319-56620-7_19","editor":[{"firstnames":["Jean-Sébastien"],"propositions":[],"lastnames":["Coron"],"suffixes":[]},{"firstnames":["Jesper","Buus"],"propositions":[],"lastnames":["Nielsen"],"suffixes":[]}],"isbn":"978-3-319-56619-1","pages":"535–566","series":"Lecture Notes in Computer Science","timestamp":"Thu, 14 Oct 2021 01:00:00 +0200","title":"Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model","url":"https://doi.org/10.1007/978-3-319-56620-7\\_19","volume":"10210","year":"2017","bibtex":"@inproceedings{DBLP:conf/eurocrypt/BartheDFGSS17,\n author = {Gilles Barthe and Fran{\\c{c}}ois Dupressoir and\nSebastian Faust and Benjamin Gr{\\'{e}}goire and\nFran{\\c{c}}ois{-}Xavier Standaert and\nPierre{-}Yves Strub},\n bibsource = {dblp computer science bibliography, https://dblp.org},\n biburl = {https://dblp.org/rec/conf/eurocrypt/BartheDFGSS17.bib},\n booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th\nAnnual International Conference on the Theory and\nApplications of Cryptographic Techniques, Paris,\nFrance, April 30 - May 4, 2017, Proceedings, Part\n{I}},\n doi = {10.1007/978-3-319-56620-7\\_19},\n editor = {Jean{-}S{\\'{e}}bastien Coron and Jesper Buus Nielsen},\n isbn = {978-3-319-56619-1},\n pages = {535--566},\n series = {Lecture Notes in Computer Science},\n timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},\n title = {Parallel Implementations of Masking Schemes and the\nBounded Moment Leakage Model},\n url = {https://doi.org/10.1007/978-3-319-56620-7\\_19},\n volume = {10210},\n year = {2017}\n}\n\n","author_short":["Barthe, G.","Dupressoir, F.","Faust, S.","Grégoire, B.","Standaert, F.","Strub, P."],"editor_short":["Coron, J.","Nielsen, J. B."],"key":"DBLP:conf/eurocrypt/BartheDFGSS17","id":"DBLP:conf/eurocrypt/BartheDFGSS17","bibbaseid":"barthe-dupressoir-faust-grgoire-standaert-strub-parallelimplementationsofmaskingschemesandtheboundedmomentleakagemodel-2017","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-319-56620-7\\_19"},"metadata":{"authorlinks":{"strub, p":"https://www.strub.nu/"}},"downloads":0,"html":""},"search_terms":["parallel","implementations","masking","schemes","bounded","moment","leakage","model","barthe","dupressoir","faust","grégoire","standaert","strub"],"keywords":[],"authorIDs":["EC8a7TQ86pYAoBS7y"],"dataSources":["q4vBTsWpxooqz6FoB"]}