nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A critical view on the real-world security of logic locking
|
Engels, Susanne |
|
|
|
3 |
p. 229-244 |
artikel |
2 |
Adaptive caches as a defense mechanism against cache side-channel attacks
|
Bandara, Sahan |
|
|
|
3 |
p. 239-255 |
artikel |
3 |
A faster method for fault attack resistance in static/ephemeral CSIDH
|
LeGrow, Jason T. |
|
|
|
3 |
p. 283-294 |
artikel |
4 |
A formal proof of countermeasures against fault injection attacks on CRT-RSA
|
Rauzy, Pablo |
|
2013 |
|
3 |
p. 173-185 |
artikel |
5 |
A formal study of two physical countermeasures against side channel attacks
|
Briais, Sébastien |
|
2013 |
|
3 |
p. 169-180 |
artikel |
6 |
A large-scale comprehensive evaluation of single-slice ring oscillator and PicoPUF bit cells on 28-nm Xilinx FPGAs
|
Gu, Chongyan |
|
|
|
3 |
p. 227-238 |
artikel |
7 |
A model of the leakage in the frequency domain and its application to CPA and DPA
|
Tiran, S. |
|
2014 |
|
3 |
p. 197-212 |
artikel |
8 |
Analysis and experimental evaluation of image-based PUFs
|
Shariati, Saloomeh |
|
2012 |
|
3 |
p. 189-206 |
artikel |
9 |
Analysis of performance versus security in hardware realizations of small elliptic curves for lightweight applications
|
Trujillo-Olaya, Vladimir |
|
2012 |
|
3 |
p. 179-188 |
artikel |
10 |
An automated framework for exploitable fault identification in block ciphers
|
Saha, Sayandeep |
|
2019 |
|
3 |
p. 203-219 |
artikel |
11 |
A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs
|
Yamamoto, Dai |
|
2014 |
|
3 |
p. 187-199 |
artikel |
12 |
A novel topology-guided attack and its countermeasure towards secure logic locking
|
Zhang, Yuqiao |
|
|
|
3 |
p. 213-226 |
artikel |
13 |
An overview of hardware-level statistical power analysis attack countermeasures
|
Mayhew, Matthew |
|
2016 |
|
3 |
p. 213-244 |
artikel |
14 |
A remark on a success rate model for side-channel attack analysis
|
Wiemers, Andreas |
|
|
|
3 |
p. 269-274 |
artikel |
15 |
A survey of algorithmic methods in IC reverse engineering
|
Azriel, Leonid |
|
|
|
3 |
p. 299-315 |
artikel |
16 |
Attribute-based encryption with enforceable obligations
|
Arshad, Hamed |
|
|
|
3 |
p. 343-371 |
artikel |
17 |
Automatic generation of HCCA-resistant scalar multiplication algorithm by proper sequencing of field multiplier operands
|
Das, Poulami |
|
2019 |
|
3 |
p. 263-275 |
artikel |
18 |
Computational aspects of correlation power analysis
|
Bottinelli, Paul |
|
2016 |
|
3 |
p. 167-181 |
artikel |
19 |
Design and implementation of a novel cryptographically secure pseudorandom number generator
|
Di Mauro, Juan |
|
|
|
3 |
p. 255-265 |
artikel |
20 |
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128
|
Salam, Iftekhar |
|
|
|
3 |
p. 265-281 |
artikel |
21 |
Efficient and secure software implementations of Fantomas
|
Cruz, Rafael J. |
|
|
|
3 |
p. 211-228 |
artikel |
22 |
Efficient regular modular exponentiation using multiplicative half-size splitting
|
Negre, Christophe |
|
2016 |
|
3 |
p. 245-253 |
artikel |
23 |
Electromagnetic fault injection: the curse of flip-flops
|
Ordas, S. |
|
2016 |
|
3 |
p. 183-197 |
artikel |
24 |
Extractors against side-channel attacks: weak or strong?
|
Medwed, Marcel |
|
2011 |
|
3 |
p. 231-241 |
artikel |
25 |
Faster 64-bit universal hashing using carry-less multiplications
|
Lemire, Daniel |
|
2015 |
|
3 |
p. 171-185 |
artikel |
26 |
Faster characteristic three polynomial multiplication and its application to NTRU Prime decapsulation
|
Yeniaras, Esra |
|
|
|
3 |
p. 329-348 |
artikel |
27 |
Fast software implementation of binary elliptic curve cryptography
|
Bluhm, Manuel |
|
2015 |
|
3 |
p. 215-226 |
artikel |
28 |
Fast verification and public key storage optimization for unstructured lattice-based signatures
|
Bajard, Jean-Claude |
|
|
|
3 |
p. 373-388 |
artikel |
29 |
Fault intensity map analysis with neural network key distinguisher
|
Ramezanpour, Keyvan |
|
|
|
3 |
p. 273-288 |
artikel |
30 |
Formally proved security of assembly code against power analysis
|
Rauzy, Pablo |
|
2015 |
|
3 |
p. 201-216 |
artikel |
31 |
Formal verification of a CRT-RSA implementation against fault attacks
|
Christofi, Maria |
|
2013 |
|
3 |
p. 157-167 |
artikel |
32 |
Formal verification of a software countermeasure against instruction skip attacks
|
Moro, N. |
|
2014 |
|
3 |
p. 145-156 |
artikel |
33 |
High performance GHASH and impacts of a class of unconventional bases
|
Méloni, Nicolas |
|
2011 |
|
3 |
p. 201-218 |
artikel |
34 |
Implementation of a leakage-resilient ElGamal key encapsulation mechanism
|
Galindo, David |
|
2016 |
|
3 |
p. 229-238 |
artikel |
35 |
Improved algebraic side-channel attack on AES
|
Mohamed, Mohamed Saied Emam |
|
2013 |
|
3 |
p. 139-156 |
artikel |
36 |
Interdiction in practice—Hardware Trojan against a high-security USB flash drive
|
Swierczynski, Pawel |
|
2016 |
|
3 |
p. 199-211 |
artikel |
37 |
Inversion-free arithmetic on elliptic curves through isomorphisms
|
Goundar, Raveen R. |
|
2016 |
|
3 |
p. 187-199 |
artikel |
38 |
Karatsuba-like formulae and their associated techniques
|
Cenk, Murat |
|
2017 |
|
3 |
p. 259-269 |
artikel |
39 |
Low-cost distance-spoofing attack on FMCW radar and its feasibility study on countermeasure
|
Nashimoto, Shoei |
|
|
|
3 |
p. 289-298 |
artikel |
40 |
MaskSIMD-lib: on the performance gap of a generic C optimized assembly and wide vector extensions for masked software with an Ascon-p test case
|
Salomon, Dor |
|
|
|
3 |
p. 325-342 |
artikel |
41 |
Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis
|
Ngo, Xuan Thuy |
|
2016 |
|
3 |
p. 239-247 |
artikel |
42 |
Mixed-radix Naccache–Stern encryption
|
Géraud, Rémi |
|
2018 |
|
3 |
p. 277-282 |
artikel |
43 |
Modulus fault attacks against RSA–CRT signatures
|
Brier, Éric |
|
2011 |
|
3 |
p. 243-253 |
artikel |
44 |
Montgomery curves and their arithmetic
|
Costello, Craig |
|
2017 |
|
3 |
p. 227-240 |
artikel |
45 |
Montgomery inversion
|
Savaş, Erkay |
|
2017 |
|
3 |
p. 201-210 |
artikel |
46 |
Montgomery reduction within the context of residue number system arithmetic
|
Bajard, Jean-Claude |
|
2017 |
|
3 |
p. 189-200 |
artikel |
47 |
Multiprecision multiplication on AVR revisited
|
Hutter, Michael |
|
2015 |
|
3 |
p. 201-214 |
artikel |
48 |
No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis
|
Kerkhof, Maikel |
|
|
|
3 |
p. 311-324 |
artikel |
49 |
On the verification of system-level information flow properties for virtualized execution platforms
|
Baumann, Christoph |
|
2019 |
|
3 |
p. 243-261 |
artikel |
50 |
PAC learning of arbiter PUFs
|
Ganji, Fatemeh |
|
2016 |
|
3 |
p. 249-258 |
artikel |
51 |
Performance of hierarchical transforms in homomorphic encryption: a case study on logistic regression inference
|
Alves, Pedro Geraldo M. R. |
|
|
|
3 |
p. 295-310 |
artikel |
52 |
Photonic power firewalls
|
Dutertre, Jean-Max |
|
|
|
3 |
p. 245-254 |
artikel |
53 |
Physical functions: the common factor of side-channel and fault attacks?
|
Robisson, Bruno |
|
2015 |
|
3 |
p. 217-227 |
artikel |
54 |
Physical security in the post-quantum era
|
Chowdhury, Sreeja |
|
|
|
3 |
p. 267-303 |
artikel |
55 |
Pinpointing side-channel information leaks in web applications
|
Mather, Luke |
|
2012 |
|
3 |
p. 161-177 |
artikel |
56 |
Polynomial direct sum masking to protect against both SCA and FIA
|
Carlet, Claude |
|
2018 |
|
3 |
p. 303-312 |
artikel |
57 |
Polynomial multiplication over binary finite fields: new upper bounds
|
De Piccoli, Alessandro |
|
|
|
3 |
p. 197-210 |
artikel |
58 |
Practical complexity differential cryptanalysis and fault analysis of AES
|
Tunstall, Michael |
|
2011 |
|
3 |
p. 219-230 |
artikel |
59 |
Recyclable PUFs: logically reconfigurable PUFs
|
Katzenbeisser, Stefan |
|
2011 |
|
3 |
p. 177-186 |
artikel |
60 |
Residue arithmetic systems in cryptography: a survey on modern security applications
|
Schoinianakis, Dimitrios |
|
|
|
3 |
p. 249-267 |
artikel |
61 |
Review of error correction for PUFs and evaluation on state-of-the-art FPGAs
|
Hiller, Matthias |
|
|
|
3 |
p. 229-247 |
artikel |
62 |
SCA secure and updatable crypto engines for FPGA SoC bitstream decryption: extended version
|
Unterstein, Florian |
|
|
|
3 |
p. 257-272 |
artikel |
63 |
Security analysis of concurrent error detection against differential fault analysis
|
Guo, Xiaofei |
|
2014 |
|
3 |
p. 153-169 |
artikel |
64 |
Side-channel robustness analysis of masked assembly codes using a symbolic approach
|
Ben El Ouahma, Inès |
|
2019 |
|
3 |
p. 231-242 |
artikel |
65 |
Side channels as building blocks
|
Kasper, Markus |
|
2012 |
|
3 |
p. 143-159 |
artikel |
66 |
Simple electromagnetic analysis attack based on geometric leak on ASIC implementation of ring-oscillator PUF
|
Shiozaki, Mitsuru |
|
|
|
3 |
p. 201-212 |
artikel |
67 |
Special issue in honor of Peter Lawrence Montgomery
|
Rodríguez-Henríquez, Francisco |
|
2017 |
|
3 |
p. 185-187 |
artikel |
68 |
Spectral arithmetic in Montgomery modular multiplication
|
Dai, Wangchen |
|
2017 |
|
3 |
p. 211-226 |
artikel |
69 |
Speeding scalar multiplication over binary elliptic curves using the new carry-less multiplication instruction
|
Taverne, Jonathan |
|
2011 |
|
3 |
p. 187-199 |
artikel |
70 |
Sycon: a new milestone in designing ASCON-like permutations
|
Mandal, Kalikinkar |
|
|
|
3 |
p. 305-327 |
artikel |
71 |
Template attacks on nano-scale CMOS devices
|
Richter, Bastian |
|
|
|
3 |
p. 275-285 |
artikel |
72 |
The ASHES 2019 special issue at JCEN
|
Chang, Chip-Hong |
|
|
|
3 |
p. 199-200 |
artikel |
73 |
The Montgomery ladder on binary elliptic curves
|
Oliveira, Thomaz |
|
2017 |
|
3 |
p. 241-258 |
artikel |
74 |
The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents
|
Chávez-Saab, Jorge |
|
|
|
3 |
p. 349-368 |
artikel |
75 |
Toward a taxonomy of communications security models
|
Brown, Mark |
|
2013 |
|
3 |
p. 181-195 |
artikel |
76 |
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis
|
Belaïd, Sonia |
|
2014 |
|
3 |
p. 157-171 |
artikel |
77 |
Triathlon of lightweight block ciphers for the Internet of things
|
Dinu, Daniel |
|
2018 |
|
3 |
p. 283-302 |
artikel |
78 |
Understanding the limitations and improving the relevance of SPICE simulations in side-channel security evaluations
|
Kamel, Dina |
|
2014 |
|
3 |
p. 187-195 |
artikel |
79 |
Vertical and horizontal correlation attacks on RNS-based exponentiations
|
Perin, Guilherme |
|
2015 |
|
3 |
p. 171-185 |
artikel |
80 |
Why attackers lose: design and security analysis of arbitrarily large XOR arbiter PUFs
|
Wisiol, Nils |
|
2019 |
|
3 |
p. 221-230 |
artikel |