共 65 条
[1]
On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT I,
2021, 12696
:528-558
[2]
Aono Y, 2009, LECT NOTES COMPUT SC, V5443, P34
[3]
Bauer Sven, 2012, Constructive Side-Channel Analysis and Secure Design. Proceedings Third International Workshop, COSADE 2012, P82, DOI 10.1007/978-3-642-29912-4_7
[4]
bbuhrow: YAFU, 2022, YAFU AUT INT FACT VE
[5]
Blömer J, 2003, LECT NOTES COMPUT SC, V2729, P27
[6]
Boneh D, 1998, LECT NOTES COMPUT SC, V1514, P25
[7]
Bos J., 2021, COMPUTATIONAL CRYPTO, DOI [10.1017/9781108854207, DOI 10.1017/9781108854207]
[8]
Botan, 2022, BOT CRYPT TLS MOD C
[9]
Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1,
2019, 11692
:713-737
[10]
BSI, 2013, AIS46 BSI RSA SCA