The following publications are possibly variants of this publication:
- The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for FreeGianluca Brian, Antonio Faonio, Maciej Obremski, João L. Ribeiro 0001, Mark Simkin 0001, Maciej Skórski, Daniele Venturi 0001. eurocrypt 2021: 408-437 [doi]
- The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for FreeGianluca Brian, Antonio Faonio, Maciej Obremski, João L. Ribeiro 0001, Mark Simkin 0001, Maciej Skórski, Daniele Venturi 0001. TIT, 68(12):8197-8227, 2022. [doi]
- Optimal Amplification of Noisy LeakagesStefan Dziembowski, Sebastian Faust, Maciej Skórski. tcc 2016: 291-318 [doi]
- Fully leakage-resilient signatures revisited: Graceful degradation, noisy leakage, and construction in the bounded-retrieval modelAntonio Faonio, Jesper Buus Nielsen, Daniele Venturi 0001. TCS, 660:23-56, 2017. [doi]