doi.org/10.1007/978-981-96-0941-3_7
Preview meta tags from the doi.org website.
Linked Hostnames
23- 23 links toscholar.google.com
- 22 links todoi.org
- 20 links tolink.springer.com
- 11 links towww.springernature.com
- 6 links toscholar.google.co.uk
- 6 links towww.ncbi.nlm.nih.gov
- 4 links tocitation-needed.springer.com
- 3 links tosupport.springernature.com
Thumbnail

Search Engine Appearance
Leakage-Resilient Incompressible Cryptography: Constructions and Barriers
We introduce Leakage-Resilient Incompressible cryptography, which simultaneously addresses two variants of side-channel attacks that have been tackled in theoretical cryptography. Leakage-resilience seeks to provide security against an adversary who learns...
Bing
Leakage-Resilient Incompressible Cryptography: Constructions and Barriers
We introduce Leakage-Resilient Incompressible cryptography, which simultaneously addresses two variants of side-channel attacks that have been tackled in theoretical cryptography. Leakage-resilience seeks to provide security against an adversary who learns...
DuckDuckGo
Leakage-Resilient Incompressible Cryptography: Constructions and Barriers
We introduce Leakage-Resilient Incompressible cryptography, which simultaneously addresses two variants of side-channel attacks that have been tackled in theoretical cryptography. Leakage-resilience seeks to provide security against an adversary who learns...
General Meta Tags
46- titleLeakage-Resilient Incompressible Cryptography: Constructions and Barriers | SpringerLink
- charsetUTF-8
- X-UA-CompatibleIE=edge
- viewportwidth=device-width, initial-scale=1
- applicable-devicepc,mobile
Open Graph Meta Tags
6- og:urlhttps://link.springer.com/chapter/10.1007/978-981-96-0941-3_7
- og:typePaper
- og:site_nameSpringerLink
- og:titleLeakage-Resilient Incompressible Cryptography: Constructions and Barriers
- og:descriptionWe introduce Leakage-Resilient Incompressible cryptography, which simultaneously addresses two variants of side-channel attacks that have been tackled in theoretical cryptography. Leakage-resilience seeks to provide security against an adversary who learns...
Twitter Meta Tags
6- twitter:siteSpringerLink
- twitter:cardsummary
- twitter:image:altContent cover image
- twitter:titleLeakage-Resilient Incompressible Cryptography: Constructions and
- twitter:descriptionWe introduce Leakage-Resilient Incompressible cryptography, which simultaneously addresses two variants of side-channel attacks that have been tackled in theoretical cryptography. Leakage-resilience seeks to provide security against an adversary who learns...
Item Prop Meta Tags
3- position1
- position2
- position3
Link Tags
9- apple-touch-icon/oscar-static/img/favicons/darwin/apple-touch-icon-6ef0829b9c.png
- canonicalhttps://link.springer.com/chapter/10.1007/978-981-96-0941-3_7
- icon/oscar-static/img/favicons/darwin/android-chrome-192x192.png
- icon/oscar-static/img/favicons/darwin/favicon-32x32.png
- icon/oscar-static/img/favicons/darwin/favicon-16x16.png
Emails
1Links
113- http://citations.springer.com/item?doi=10.1007/978-981-96-0941-3_7
- http://dx.doi.org/10.1561/0400000010
- http://scholar.google.co.uk/scholar?as_q=&num=10&btnG=Search+Scholar&as_epq=&as_oq=&as_eq=&as_occt=any&as_sauthors=%22Kaartik%20Bhushan%22&as_publication=&as_ylo=&as_yhi=&as_allsubj=all&hl=en
- http://scholar.google.co.uk/scholar?as_q=&num=10&btnG=Search+Scholar&as_epq=&as_oq=&as_eq=&as_occt=any&as_sauthors=%22Mahesh%20Sreekumar%20Rajasree%22&as_publication=&as_ylo=&as_yhi=&as_allsubj=all&hl=en
- http://scholar.google.co.uk/scholar?as_q=&num=10&btnG=Search+Scholar&as_epq=&as_oq=&as_eq=&as_occt=any&as_sauthors=%22Manoj%20Prabhakaran%22&as_publication=&as_ylo=&as_yhi=&as_allsubj=all&hl=en