Non-malleable secret sharing against bounded joint-tampering attacks in the plain model G Brian, A Faonio, M Obremski, M Simkin, D Venturi Annual International Cryptology Conference, 127-155, 2020 | 21 | 2020 |
Continuously non-malleable secret sharing for general access structures G Brian, A Faonio, D Venturi Theory of Cryptography Conference, 211-232, 2019 | 14 | 2019 |
Continuously non-malleable secret sharing: joint tampering, plain model and capacity G Brian, A Faonio, D Venturi Theory of Cryptography Conference, 333-364, 2021 | 7 | 2021 |
Short non-malleable codes from related-key secure block ciphers, revisited G Brian, A Faonio, J Ribeiro, D Venturi Cryptology ePrint Archive, 2022 | 3 | 2022 |
The mother of all leakages: How to simulate noisy leakages via bounded leakage (almost) for free G Brian, A Faonio, M Obremski, J Ribeiro, M Simkin, M Skórski, D Venturi Annual International Conference on the Theory and Applications of …, 2021 | 2 | 2021 |
Continuously non-malleable codes against bounded-depth tampering G Brian, S Faust, E Micheli, D Venturi International Conference on the Theory and Application of Cryptology and …, 2022 | 1 | 2022 |
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free G Brian, A Faonio, M Obremski, J Ribeiro, M Simkin, M Skórski, D Venturi IEEE Transactions on Information Theory 68 (12), 8197-8227, 2022 | 1 | 2022 |
From Random Probing to Noisy Leakages Without Field-Size Dependence G Brian, S Dziembowski, S Faust Cryptology ePrint Archive, 2024 | | 2024 |
Non-malleable secret sharing against joint tampering attacks G Brian | | 2023 |