Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             76 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Achieving side-channel high-order correlation immunity with leakage squeezing Carlet, Claude
2014
2 p. 107-121
artikel
2 A comprehensive tolerant algebraic side-channel attack over modern ciphers using constraint programming Liu, Fanghui

2 p. 197-228
artikel
3 A differential fault attack on the WG family of stream ciphers Orumiehchiha, Mohammad Ali

2 p. 189-195
artikel
4 A fair evaluation framework for comparing side-channel distinguishers Whitnall, Carolyn
2011
2 p. 145-160
artikel
5 A low-area unified hardware architecture for the AES and the cryptographic hash function ECHO Beuchat, Jean-Luc
2011
2 p. 101-121
artikel
6 A machine learning approach against a masked AES Lerman, Liran
2014
2 p. 123-139
artikel
7 A method for constructing sliding windows leak from noisy cache timing information Ueno, Rei

2 p. 161-170
artikel
8 An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers Werner, Vincent

2 p. 149-165
artikel
9 Applications of machine learning techniques in side-channel attacks: a survey Hettwer, Benjamin

2 p. 135-162
artikel
10 A review of lightweight block ciphers Hatzivasilis, George
2017
2 p. 141-184
artikel
11 A unified masking approach Gross, Hannes
2018
2 p. 109-124
artikel
12 Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC Gross, Mathieu

2 p. 181-196
artikel
13 CacheBleed: a timing attack on OpenSSL constant-time RSA Yarom, Yuval
2017
2 p. 99-112
artikel
14 Charm: a framework for rapidly prototyping cryptosystems Akinyele, Joseph A.
2013
2 p. 111-128
artikel
15 Constant-time higher-order Boolean-to-arithmetic masking Hutter, Michael
2018
2 p. 173-184
artikel
16 Construction of equivalent linear trails and multiple linear attack on reduced-round GIFT-64 Cui, Yaxin

2 p. 223-234
artikel
17 Correction to: Editorial about PROOFS 2019 Heydemann, Karine

2 p. 197
artikel
18 Deep learning for side-channel analysis and introduction to ASCAD database Benadjila, Ryad

2 p. 163-188
artikel
19 Design and implementation of low-depth pairing-based homomorphic encryption scheme Herbert, Vincent
2018
2 p. 185-201
artikel
20 Designing stream ciphers with scalable data-widths: a case study with HC-128 Paul, Goutam
2014
2 p. 135-143
artikel
21 Detecting faults in inner product masking scheme Cheng, Wei

2 p. 119-133
artikel
22 Differential fault analysis of AES: towards reaching its limits Ali, Sk Subidh
2012
2 p. 73-97
artikel
23 Editorial about PROOFS 2019 Heydemann, Karine

2 p. 103-104
artikel
24 Efficient binary polynomial multiplication based on optimized Karatsuba reconstruction Negre, Chistophe
2014
2 p. 91-106
artikel
25 Efficient Fixed-base exponentiation and scalar multiplication based on a multiplicative splitting exponent recoding Robert, Jean-Marc
2018
2 p. 115-136
artikel
26 Efficient modular operations using the adapted modular number system Didier, Laurent-Stéphane

2 p. 111-133
artikel
27 End-to-end automated cache-timing attack driven by machine learning Perianin, Thomas

2 p. 135-146
artikel
28 Exclusive exponent blinding is not enough to prevent any timing attack on RSA Schindler, Werner
2016
2 p. 101-119
artikel
29 Faster modular arithmetic for isogeny-based crypto on embedded devices Bos, Joppe W.

2 p. 97-109
artikel
30 Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures Coron, Jean-Sébastien
2015
2 p. 73-83
artikel
31 Fast prime field elliptic-curve cryptography with 256-bit primes Gueron, Shay
2014
2 p. 141-151
artikel
32 Get your hands off my laptop: physical side-channel key-extraction attacks on PCs Genkin, Daniel
2015
2 p. 95-112
artikel
33 Having no mathematical model may not secure PUFs Ganji, Fatemeh
2017
2 p. 113-128
artikel
34 Higher-order glitch free implementation of the AES using Secure Multi-Party Computation protocols Roche, Thomas
2012
2 p. 111-127
artikel
35 Highly efficient $$\textit{GF}(2^8)$$GF(28) inversion circuit based on hybrid GF representations Ueno, Rei
2018
2 p. 101-113
artikel
36 High-speed high-security signatures Bernstein, Daniel J.
2012
2 p. 77-89
artikel
37 Homomorphic encryption for stochastic computing Koseki, Ryusuke

2 p. 251-263
artikel
38 Improved cryptanalysis of the DECT standard cipher Coisel, Iwen
2016
2 p. 155-169
artikel
39 Improved fault analysis on SIMECK ciphers Le, Duc-Phong

2 p. 169-180
artikel
40 Improving cross-device attacks using zero-mean unit-variance normalization Montminy, David P.
2012
2 p. 99-110
artikel
41 In-depth energy analysis of security algorithms and protocols for the Internet of Things Winderickx, Jori

2 p. 137-149
artikel
42 Introduction to the CHES 2015 special issue Güneysu, Tim
2016
2 p. 83-84
artikel
43 Introduction to the CHES 2017 special issue Fischer, Wieland
2018
2 p. 93-94
artikel
44 Introduction to the CHES 2016 special issue Gierlichs, Benedikt
2017
2 p. 97-98
artikel
45 Introduction to the CHES 2014 special issue Batina, Lejla
2015
2 p. 71-72
artikel
46 IPM-RED: combining higher-order masking with robust error detection Keren, Osnat

2 p. 147-160
artikel
47 Leakage assessment methodology Schneider, Tobias
2016
2 p. 85-99
artikel
48 Lyra: password-based key derivation with tunable memory and processing costs Almeida, Leonardo C.
2014
2 p. 75-89
artikel
49 Masking ring-LWE Reparaz, Oscar
2016
2 p. 139-153
artikel
50 McBits revisited: toward a fast constant-time code-based KEM Chou, Tung
2018
2 p. 95-107
artikel
51 MEAS: memory encryption and authentication secure against side-channel attacks Unterluggauer, Thomas
2018
2 p. 137-158
artikel
52 Minimizing performance overhead in memory encryption Kurdziel, Michael T.
2013
2 p. 129-138
artikel
53 Modelling cryptographic distinguishers using machine learning Brunetta, Carlo

2 p. 123-135
artikel
54 Mul-IBS: a multivariate identity-based signature scheme compatible with IoT-based NDN architecture Debnath, Sumit Kumar

2 p. 187-199
artikel
55 Multi-exponentiation algorithm based on binary GCD computation and its application to side-channel countermeasure Yen, Sung-Ming
2012
2 p. 99-110
artikel
56 Parallel bitsliced AES through PHAST: a single-source high-performance library for multi-cores and GPUs Peccerillo, Biagio
2017
2 p. 159-171
artikel
57 Practical feasibility evaluation and improvement of a pay-per-use licensing scheme for hardware IP cores in Xilinx FPGAs Vliegen, Jo
2014
2 p. 113-122
artikel
58 Protecting AES against side-channel analysis using wire-tap codes Bringer, Julien
2012
2 p. 129-141
artikel
59 Rank estimation with bounded error via exponential sampling David, Liron

2 p. 151-168
artikel
60 Removable weak keys for discrete logarithm-based cryptography Jacobson, Michael John

2 p. 181-195
artikel
61 Reversing stealthy dopant-level circuits Sugawara, Takeshi
2015
2 p. 85-94
artikel
62 Rock’n’roll PUFs: crafting provably secure pufs from less secure ones (extended version) Ganji, Fatemeh

2 p. 105-118
artikel
63 Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic Goundar, Raveen R.
2011
2 p. 161-176
artikel
64 Scaling efficient code-based cryptosystems for embedded platforms Biasi, Felipe P.
2014
2 p. 123-134
artikel
65 Secure key generation from biased PUFs: extended version Maes, Roel
2016
2 p. 121-137
artikel
66 Sequential multiplier with sub-linear gate complexity Hasan, M. Anwar
2012
2 p. 91-97
artikel
67 Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning Masure, Loïc

2 p. 129-147
artikel
68 Side-channel analysis of a learning parity with physical noise processor Kamel, Dina

2 p. 171-179
artikel
69 SPA-resistant binary exponentiation with optimal execution time Moreno, Carlos
2011
2 p. 87-99
artikel
70 SPSA: Semi-Permanent Stuck-At fault analysis of AES Rijndael SBox Joshi, Priyanka

2 p. 201-222
artikel
71 Streamlined NTRU Prime on FPGA Peng, Bo-Yuan

2 p. 167-186
artikel
72 StringENT test suite: ENT battery revisited for efficient P value computation Almaraz Luengo, Elena

2 p. 235-249
artikel
73 Strong 8-bit Sboxes with efficient masking in hardware extended version Boss, Erik
2017
2 p. 149-165
artikel
74 Towards easy leakage certification: extended version Durvaux, François
2017
2 p. 129-147
artikel
75 Univariate side channel attacks and leakage modeling Doget, Julien
2011
2 p. 123-144
artikel
76 Your rails cannot hide from localized EM: how dual-rail logic fails on FPGAs—extended version Immler, Vincent
2018
2 p. 125-139
artikel
                             76 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland