Protecting cryptographic keys against continual leakage A Juma, Y Vahlis Advances in Cryptology–CRYPTO 2010, 41-58, 2010 | 93 | 2010 |
The black-box query complexity of polynomial summation A Juma, V Kabanets, C Rackoff, A Shpilka Computational Complexity 18 (1), 59-79, 2009 | 13 | 2009 |
Limits on the stretch of non-adaptive constructions of pseudo-random generators J Bronson, A Juma, PA Papakonstantinou Proceedings of the 8th conference on Theory of cryptography, 504-521, 2011 | 9 | 2011 |
On protecting cryptographic keys against side-channel attacks A Juma, Y Vahlis Advances in Cryptology–CRYPTO’10, 41-58, 2010 | 7 | 2010 |
Multi-location leakage resilient cryptography A Juma, Y Vahlis, M Yung International Workshop on Public Key Cryptography, 504-521, 2012 | 3 | 2012 |
Leakage resilience and black-box impossibility results in cryptography A Juma University of Toronto, 2011 | | 2011 |
Some Results in Computational Complexity A Juma University of Toronto, 2005 | | 2005 |