Leakage-Resilient Circuits without Computational Assumptions. Dziembowski, S. & Faust, S. In Proceedings of Theory of Cryptography Conference (TCC), pages 230-247, 2012.
Paper bibtex @inproceedings{ dblp2632216,
title = {Leakage-Resilient Circuits without Computational Assumptions},
author = {Stefan Dziembowski and Sebastian Faust},
author_short = {Dziembowski, S. and Faust, S.},
bibtype = {inproceedings},
type = {inproceedings},
year = {2012},
key = {dblp2632216},
id = {dblp2632216},
biburl = {http://www.dblp.org/rec/bibtex/conf/tcc/DziembowskiF12},
url = {http://dx.doi.org/10.1007/978-3-642-28914-9_13},
conference = {TCC},
pages = {230-247},
text = {TCC 2012:230-247},
booktitle = {Proceedings of Theory of Cryptography Conference (TCC)}
}
Downloads: 0
{"_id":{"_str":"53b199adfc92d01341000572"},"__v":0,"authorIDs":["56c5bb57dd338cfd2c00003d"],"author_short":["Dziembowski, S.","Faust, S."],"bibbaseid":"dziembowski-faust-leakageresilientcircuitswithoutcomputationalassumptions-2012","bibdata":{"title":"Leakage-Resilient Circuits without Computational Assumptions","author":["Stefan Dziembowski","Sebastian Faust"],"author_short":["Dziembowski, S.","Faust, S."],"bibtype":"inproceedings","type":"inproceedings","year":"2012","key":"dblp2632216","id":"dblp2632216","biburl":"http://www.dblp.org/rec/bibtex/conf/tcc/DziembowskiF12","url":"http://dx.doi.org/10.1007/978-3-642-28914-9_13","conference":"TCC","pages":"230-247","text":"TCC 2012:230-247","booktitle":"Proceedings of Theory of Cryptography Conference (TCC)","bibtex":"@inproceedings{ dblp2632216,\n title = {Leakage-Resilient Circuits without Computational Assumptions},\n author = {Stefan Dziembowski and Sebastian Faust},\n author_short = {Dziembowski, S. and Faust, S.},\n bibtype = {inproceedings},\n type = {inproceedings},\n year = {2012},\n key = {dblp2632216},\n id = {dblp2632216},\n biburl = {http://www.dblp.org/rec/bibtex/conf/tcc/DziembowskiF12},\n url = {http://dx.doi.org/10.1007/978-3-642-28914-9_13},\n conference = {TCC},\n pages = {230-247},\n text = {TCC 2012:230-247},\n booktitle = {Proceedings of Theory of Cryptography Conference (TCC)}\n}","bibbaseid":"dziembowski-faust-leakageresilientcircuitswithoutcomputationalassumptions-2012","role":"author","urls":{"Paper":"http://dx.doi.org/10.1007/978-3-642-28914-9_13"},"downloads":0,"html":""},"bibtype":"inproceedings","biburl":"http://www.dblp.org/rec/bibtex/conf/tcc/DziembowskiF12","creationDate":"2014-06-30T17:09:01.812Z","downloads":0,"keywords":[],"search_terms":["leakage","resilient","circuits","without","computational","assumptions","dziembowski","faust"],"title":"Leakage-Resilient Circuits without Computational Assumptions","year":2012,"dataSources":["gqJwD8ApbfhoQxPdz"]}