Unifying Leakage Models: From Probing Attacks to Noisy Leakage. Duc, A., Dziembowski, S., & Faust, S. In Proceedings of Theory and Application of Cryptographic Techniques (EUROCRYPT), pages 423-440, 2014. Paper bibtex @inproceedings{ dblp2008252,
title = {Unifying Leakage Models: From Probing Attacks to Noisy Leakage},
author = {Alexandre Duc and Stefan Dziembowski and Sebastian Faust},
author_short = {Duc, A. and Dziembowski, S. and Faust, S.},
bibtype = {inproceedings},
type = {inproceedings},
year = {2014},
key = {dblp2008252},
id = {dblp2008252},
biburl = {http://www.dblp.org/rec/bibtex/conf/eurocrypt/DucDF14},
url = {http://dx.doi.org/10.1007/978-3-642-55220-5_24},
conference = {EUROCRYPT},
pages = {423-440},
text = {EUROCRYPT 2014:423-440},
booktitle = {Proceedings of Theory and Application of Cryptographic Techniques (EUROCRYPT)}
}
Downloads: 0
{"_id":{"_str":"53b199adfc92d01341000579"},"__v":0,"authorIDs":["56c5bb57dd338cfd2c00003d"],"author_short":["Duc, A.","Dziembowski, S.","Faust, S."],"bibbaseid":"duc-dziembowski-faust-unifyingleakagemodelsfromprobingattackstonoisyleakage-2014","bibdata":{"title":"Unifying Leakage Models: From Probing Attacks to Noisy Leakage","author":["Alexandre Duc","Stefan Dziembowski","Sebastian Faust"],"author_short":["Duc, A.","Dziembowski, S.","Faust, S."],"bibtype":"inproceedings","type":"inproceedings","year":"2014","key":"dblp2008252","id":"dblp2008252","biburl":"http://www.dblp.org/rec/bibtex/conf/eurocrypt/DucDF14","url":"http://dx.doi.org/10.1007/978-3-642-55220-5_24","conference":"EUROCRYPT","pages":"423-440","text":"EUROCRYPT 2014:423-440","booktitle":"Proceedings of Theory and Application of Cryptographic Techniques (EUROCRYPT)","bibtex":"@inproceedings{ dblp2008252,\n title = {Unifying Leakage Models: From Probing Attacks to Noisy Leakage},\n author = {Alexandre Duc and Stefan Dziembowski and Sebastian Faust},\n author_short = {Duc, A. and Dziembowski, S. and Faust, S.},\n bibtype = {inproceedings},\n type = {inproceedings},\n year = {2014},\n key = {dblp2008252},\n id = {dblp2008252},\n biburl = {http://www.dblp.org/rec/bibtex/conf/eurocrypt/DucDF14},\n url = {http://dx.doi.org/10.1007/978-3-642-55220-5_24},\n conference = {EUROCRYPT},\n pages = {423-440},\n text = {EUROCRYPT 2014:423-440},\n booktitle = {Proceedings of Theory and Application of Cryptographic Techniques (EUROCRYPT)}\n}","bibbaseid":"duc-dziembowski-faust-unifyingleakagemodelsfromprobingattackstonoisyleakage-2014","role":"author","urls":{"Paper":"http://dx.doi.org/10.1007/978-3-642-55220-5_24"},"downloads":0,"html":""},"bibtype":"inproceedings","biburl":"http://www.dblp.org/rec/bibtex/conf/eurocrypt/DucDF14","creationDate":"2014-06-30T17:09:01.855Z","downloads":0,"keywords":[],"search_terms":["unifying","leakage","models","probing","attacks","noisy","leakage","duc","dziembowski","faust"],"title":"Unifying Leakage Models: From Probing Attacks to Noisy Leakage","year":2014,"dataSources":["H5nHnwuDBmcfbqaGL"]}