nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Achieving side-channel high-order correlation immunity with leakage squeezing
|
Carlet, Claude |
|
2014 |
|
2 |
p. 107-121 |
artikel |
2 |
A comprehensive tolerant algebraic side-channel attack over modern ciphers using constraint programming
|
Liu, Fanghui |
|
|
|
2 |
p. 197-228 |
artikel |
3 |
A differential fault attack on the WG family of stream ciphers
|
Orumiehchiha, Mohammad Ali |
|
|
|
2 |
p. 189-195 |
artikel |
4 |
A fair evaluation framework for comparing side-channel distinguishers
|
Whitnall, Carolyn |
|
2011 |
|
2 |
p. 145-160 |
artikel |
5 |
A low-area unified hardware architecture for the AES and the cryptographic hash function ECHO
|
Beuchat, Jean-Luc |
|
2011 |
|
2 |
p. 101-121 |
artikel |
6 |
A machine learning approach against a masked AES
|
Lerman, Liran |
|
2014 |
|
2 |
p. 123-139 |
artikel |
7 |
A method for constructing sliding windows leak from noisy cache timing information
|
Ueno, Rei |
|
|
|
2 |
p. 161-170 |
artikel |
8 |
An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers
|
Werner, Vincent |
|
|
|
2 |
p. 149-165 |
artikel |
9 |
Applications of machine learning techniques in side-channel attacks: a survey
|
Hettwer, Benjamin |
|
|
|
2 |
p. 135-162 |
artikel |
10 |
A review of lightweight block ciphers
|
Hatzivasilis, George |
|
2017 |
|
2 |
p. 141-184 |
artikel |
11 |
A unified masking approach
|
Gross, Hannes |
|
2018 |
|
2 |
p. 109-124 |
artikel |
12 |
Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC
|
Gross, Mathieu |
|
|
|
2 |
p. 181-196 |
artikel |
13 |
CacheBleed: a timing attack on OpenSSL constant-time RSA
|
Yarom, Yuval |
|
2017 |
|
2 |
p. 99-112 |
artikel |
14 |
Charm: a framework for rapidly prototyping cryptosystems
|
Akinyele, Joseph A. |
|
2013 |
|
2 |
p. 111-128 |
artikel |
15 |
Constant-time higher-order Boolean-to-arithmetic masking
|
Hutter, Michael |
|
2018 |
|
2 |
p. 173-184 |
artikel |
16 |
Construction of equivalent linear trails and multiple linear attack on reduced-round GIFT-64
|
Cui, Yaxin |
|
|
|
2 |
p. 223-234 |
artikel |
17 |
Correction to: Editorial about PROOFS 2019
|
Heydemann, Karine |
|
|
|
2 |
p. 197 |
artikel |
18 |
Deep learning for side-channel analysis and introduction to ASCAD database
|
Benadjila, Ryad |
|
|
|
2 |
p. 163-188 |
artikel |
19 |
Design and implementation of low-depth pairing-based homomorphic encryption scheme
|
Herbert, Vincent |
|
2018 |
|
2 |
p. 185-201 |
artikel |
20 |
Designing stream ciphers with scalable data-widths: a case study with HC-128
|
Paul, Goutam |
|
2014 |
|
2 |
p. 135-143 |
artikel |
21 |
Detecting faults in inner product masking scheme
|
Cheng, Wei |
|
|
|
2 |
p. 119-133 |
artikel |
22 |
Differential fault analysis of AES: towards reaching its limits
|
Ali, Sk Subidh |
|
2012 |
|
2 |
p. 73-97 |
artikel |
23 |
Editorial about PROOFS 2019
|
Heydemann, Karine |
|
|
|
2 |
p. 103-104 |
artikel |
24 |
Efficient binary polynomial multiplication based on optimized Karatsuba reconstruction
|
Negre, Chistophe |
|
2014 |
|
2 |
p. 91-106 |
artikel |
25 |
Efficient Fixed-base exponentiation and scalar multiplication based on a multiplicative splitting exponent recoding
|
Robert, Jean-Marc |
|
2018 |
|
2 |
p. 115-136 |
artikel |
26 |
Efficient modular operations using the adapted modular number system
|
Didier, Laurent-Stéphane |
|
|
|
2 |
p. 111-133 |
artikel |
27 |
End-to-end automated cache-timing attack driven by machine learning
|
Perianin, Thomas |
|
|
|
2 |
p. 135-146 |
artikel |
28 |
Exclusive exponent blinding is not enough to prevent any timing attack on RSA
|
Schindler, Werner |
|
2016 |
|
2 |
p. 101-119 |
artikel |
29 |
Faster modular arithmetic for isogeny-based crypto on embedded devices
|
Bos, Joppe W. |
|
|
|
2 |
p. 97-109 |
artikel |
30 |
Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures
|
Coron, Jean-Sébastien |
|
2015 |
|
2 |
p. 73-83 |
artikel |
31 |
Fast prime field elliptic-curve cryptography with 256-bit primes
|
Gueron, Shay |
|
2014 |
|
2 |
p. 141-151 |
artikel |
32 |
Get your hands off my laptop: physical side-channel key-extraction attacks on PCs
|
Genkin, Daniel |
|
2015 |
|
2 |
p. 95-112 |
artikel |
33 |
Having no mathematical model may not secure PUFs
|
Ganji, Fatemeh |
|
2017 |
|
2 |
p. 113-128 |
artikel |
34 |
Higher-order glitch free implementation of the AES using Secure Multi-Party Computation protocols
|
Roche, Thomas |
|
2012 |
|
2 |
p. 111-127 |
artikel |
35 |
Highly efficient $$\textit{GF}(2^8)$$GF(28) inversion circuit based on hybrid GF representations
|
Ueno, Rei |
|
2018 |
|
2 |
p. 101-113 |
artikel |
36 |
High-speed high-security signatures
|
Bernstein, Daniel J. |
|
2012 |
|
2 |
p. 77-89 |
artikel |
37 |
Homomorphic encryption for stochastic computing
|
Koseki, Ryusuke |
|
|
|
2 |
p. 251-263 |
artikel |
38 |
Improved cryptanalysis of the DECT standard cipher
|
Coisel, Iwen |
|
2016 |
|
2 |
p. 155-169 |
artikel |
39 |
Improved fault analysis on SIMECK ciphers
|
Le, Duc-Phong |
|
|
|
2 |
p. 169-180 |
artikel |
40 |
Improving cross-device attacks using zero-mean unit-variance normalization
|
Montminy, David P. |
|
2012 |
|
2 |
p. 99-110 |
artikel |
41 |
In-depth energy analysis of security algorithms and protocols for the Internet of Things
|
Winderickx, Jori |
|
|
|
2 |
p. 137-149 |
artikel |
42 |
Introduction to the CHES 2015 special issue
|
Güneysu, Tim |
|
2016 |
|
2 |
p. 83-84 |
artikel |
43 |
Introduction to the CHES 2017 special issue
|
Fischer, Wieland |
|
2018 |
|
2 |
p. 93-94 |
artikel |
44 |
Introduction to the CHES 2016 special issue
|
Gierlichs, Benedikt |
|
2017 |
|
2 |
p. 97-98 |
artikel |
45 |
Introduction to the CHES 2014 special issue
|
Batina, Lejla |
|
2015 |
|
2 |
p. 71-72 |
artikel |
46 |
IPM-RED: combining higher-order masking with robust error detection
|
Keren, Osnat |
|
|
|
2 |
p. 147-160 |
artikel |
47 |
Leakage assessment methodology
|
Schneider, Tobias |
|
2016 |
|
2 |
p. 85-99 |
artikel |
48 |
Lyra: password-based key derivation with tunable memory and processing costs
|
Almeida, Leonardo C. |
|
2014 |
|
2 |
p. 75-89 |
artikel |
49 |
Masking ring-LWE
|
Reparaz, Oscar |
|
2016 |
|
2 |
p. 139-153 |
artikel |
50 |
McBits revisited: toward a fast constant-time code-based KEM
|
Chou, Tung |
|
2018 |
|
2 |
p. 95-107 |
artikel |
51 |
MEAS: memory encryption and authentication secure against side-channel attacks
|
Unterluggauer, Thomas |
|
2018 |
|
2 |
p. 137-158 |
artikel |
52 |
Minimizing performance overhead in memory encryption
|
Kurdziel, Michael T. |
|
2013 |
|
2 |
p. 129-138 |
artikel |
53 |
Modelling cryptographic distinguishers using machine learning
|
Brunetta, Carlo |
|
|
|
2 |
p. 123-135 |
artikel |
54 |
Mul-IBS: a multivariate identity-based signature scheme compatible with IoT-based NDN architecture
|
Debnath, Sumit Kumar |
|
|
|
2 |
p. 187-199 |
artikel |
55 |
Multi-exponentiation algorithm based on binary GCD computation and its application to side-channel countermeasure
|
Yen, Sung-Ming |
|
2012 |
|
2 |
p. 99-110 |
artikel |
56 |
Parallel bitsliced AES through PHAST: a single-source high-performance library for multi-cores and GPUs
|
Peccerillo, Biagio |
|
2017 |
|
2 |
p. 159-171 |
artikel |
57 |
Practical feasibility evaluation and improvement of a pay-per-use licensing scheme for hardware IP cores in Xilinx FPGAs
|
Vliegen, Jo |
|
2014 |
|
2 |
p. 113-122 |
artikel |
58 |
Protecting AES against side-channel analysis using wire-tap codes
|
Bringer, Julien |
|
2012 |
|
2 |
p. 129-141 |
artikel |
59 |
Rank estimation with bounded error via exponential sampling
|
David, Liron |
|
|
|
2 |
p. 151-168 |
artikel |
60 |
Removable weak keys for discrete logarithm-based cryptography
|
Jacobson, Michael John |
|
|
|
2 |
p. 181-195 |
artikel |
61 |
Reversing stealthy dopant-level circuits
|
Sugawara, Takeshi |
|
2015 |
|
2 |
p. 85-94 |
artikel |
62 |
Rock’n’roll PUFs: crafting provably secure pufs from less secure ones (extended version)
|
Ganji, Fatemeh |
|
|
|
2 |
p. 105-118 |
artikel |
63 |
Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic
|
Goundar, Raveen R. |
|
2011 |
|
2 |
p. 161-176 |
artikel |
64 |
Scaling efficient code-based cryptosystems for embedded platforms
|
Biasi, Felipe P. |
|
2014 |
|
2 |
p. 123-134 |
artikel |
65 |
Secure key generation from biased PUFs: extended version
|
Maes, Roel |
|
2016 |
|
2 |
p. 121-137 |
artikel |
66 |
Sequential multiplier with sub-linear gate complexity
|
Hasan, M. Anwar |
|
2012 |
|
2 |
p. 91-97 |
artikel |
67 |
Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning
|
Masure, Loïc |
|
|
|
2 |
p. 129-147 |
artikel |
68 |
Side-channel analysis of a learning parity with physical noise processor
|
Kamel, Dina |
|
|
|
2 |
p. 171-179 |
artikel |
69 |
SPA-resistant binary exponentiation with optimal execution time
|
Moreno, Carlos |
|
2011 |
|
2 |
p. 87-99 |
artikel |
70 |
SPSA: Semi-Permanent Stuck-At fault analysis of AES Rijndael SBox
|
Joshi, Priyanka |
|
|
|
2 |
p. 201-222 |
artikel |
71 |
Streamlined NTRU Prime on FPGA
|
Peng, Bo-Yuan |
|
|
|
2 |
p. 167-186 |
artikel |
72 |
StringENT test suite: ENT battery revisited for efficient P value computation
|
Almaraz Luengo, Elena |
|
|
|
2 |
p. 235-249 |
artikel |
73 |
Strong 8-bit Sboxes with efficient masking in hardware extended version
|
Boss, Erik |
|
2017 |
|
2 |
p. 149-165 |
artikel |
74 |
Towards easy leakage certification: extended version
|
Durvaux, François |
|
2017 |
|
2 |
p. 129-147 |
artikel |
75 |
Univariate side channel attacks and leakage modeling
|
Doget, Julien |
|
2011 |
|
2 |
p. 123-144 |
artikel |
76 |
Your rails cannot hide from localized EM: how dual-rail logic fails on FPGAs—extended version
|
Immler, Vincent |
|
2018 |
|
2 |
p. 125-139 |
artikel |