Impossibility of Black-Box Simulation Against Leakage Attacks. Ostrovsky, R., Persiano, G., & Visconti, I. In Gennaro, R. & Robshaw, M., editors, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II, volume 9216, of Lecture Notes in Computer Science, pages 130–149, 2015. Springer.
Paper doi bibtex @inproceedings{DBLP:conf/crypto/OstrovskyPV15,
author = {Rafail Ostrovsky and
Giuseppe Persiano and
Ivan Visconti},
editor = {Rosario Gennaro and
Matthew Robshaw},
title = {Impossibility of Black-Box Simulation Against Leakage Attacks},
booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
series = {Lecture Notes in Computer Science},
volume = {9216},
pages = {130--149},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-662-48000-7\_7},
doi = {10.1007/978-3-662-48000-7\_7},
timestamp = {Tue, 20 Aug 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/crypto/OstrovskyPV15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"9ED6EwZS69HNmk6Nt","bibbaseid":"ostrovsky-persiano-visconti-impossibilityofblackboxsimulationagainstleakageattacks-2015","author_short":["Ostrovsky, R.","Persiano, G.","Visconti, I."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Rafail"],"propositions":[],"lastnames":["Ostrovsky"],"suffixes":[]},{"firstnames":["Giuseppe"],"propositions":[],"lastnames":["Persiano"],"suffixes":[]},{"firstnames":["Ivan"],"propositions":[],"lastnames":["Visconti"],"suffixes":[]}],"editor":[{"firstnames":["Rosario"],"propositions":[],"lastnames":["Gennaro"],"suffixes":[]},{"firstnames":["Matthew"],"propositions":[],"lastnames":["Robshaw"],"suffixes":[]}],"title":"Impossibility of Black-Box Simulation Against Leakage Attacks","booktitle":"Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II","series":"Lecture Notes in Computer Science","volume":"9216","pages":"130–149","publisher":"Springer","year":"2015","url":"https://doi.org/10.1007/978-3-662-48000-7\\_7","doi":"10.1007/978-3-662-48000-7_7","timestamp":"Tue, 20 Aug 2019 01:00:00 +0200","biburl":"https://dblp.org/rec/conf/crypto/OstrovskyPV15.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/crypto/OstrovskyPV15,\n author = {Rafail Ostrovsky and\n Giuseppe Persiano and\n Ivan Visconti},\n editor = {Rosario Gennaro and\n Matthew Robshaw},\n title = {Impossibility of Black-Box Simulation Against Leakage Attacks},\n booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,\n Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},\n series = {Lecture Notes in Computer Science},\n volume = {9216},\n pages = {130--149},\n publisher = {Springer},\n year = {2015},\n url = {https://doi.org/10.1007/978-3-662-48000-7\\_7},\n doi = {10.1007/978-3-662-48000-7\\_7},\n timestamp = {Tue, 20 Aug 2019 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/crypto/OstrovskyPV15.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Ostrovsky, R.","Persiano, G.","Visconti, I."],"editor_short":["Gennaro, R.","Robshaw, M."],"key":"DBLP:conf/crypto/OstrovskyPV15","id":"DBLP:conf/crypto/OstrovskyPV15","bibbaseid":"ostrovsky-persiano-visconti-impossibilityofblackboxsimulationagainstleakageattacks-2015","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-662-48000-7\\_7"},"metadata":{"authorlinks":{}},"downloads":0,"html":""},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/p/GiuseppePersiano.bib","dataSources":["MJX3ZsyxaSJzBvjus"],"keywords":[],"search_terms":["impossibility","black","box","simulation","against","leakage","attacks","ostrovsky","persiano","visconti"],"title":"Impossibility of Black-Box Simulation Against Leakage Attacks","year":2015}