Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             79 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A class of safe and efficient binary Edwards curves Farias, Luckas A.
2018
4 p. 271-283
artikel
2 A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention Mukherjee, Rijoy

4 p. 495-522
artikel
3 A framework for leaking secrets to past instructions Fustos, Jacob

4 p. 461-473
artikel
4 A new class of irreducible pentanomials for polynomial-based multipliers in binary fields Banegas, Gustavo
2018
4 p. 359-373
artikel
5 A new method of black box power analysis and a fast algorithm for optimal key search Dichtl, Markus
2011
4 p. 255-264
artikel
6 An on-chip glitchy-clock generator for testing fault injection attacks Endo, Sho
2011
4 p. 265-270
artikel
7 Another dimension in integrated circuit trust DeVale, John
2017
4 p. 315-326
artikel
8 A practical device authentication scheme using SRAM PUFs Koeberl, Patrick
2012
4 p. 255-269
artikel
9 Arithmetic of $$\tau $$τ-adic expansions for lightweight Koblitz curve cryptography Järvinen, Kimmo
2018
4 p. 285-300
artikel
10 A side-channel attack on a masked and shuffled software implementation of Saber Ngo, Kalle

4 p. 443-460
artikel
11 A statistics-based success rate model for DPA and CPA Fei, Yunsi
2015
4 p. 227-243
artikel
12 A study on analyzing side-channel resistant encoding schemes with respect to fault attacks Breier, Jakub
2017
4 p. 311-320
artikel
13 A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards Danger, Jean-Luc
2013
4 p. 241-265
artikel
14 A toolbox for software optimization of QC-MDPC code-based cryptosystems Drucker, Nir
2019
4 p. 341-357
artikel
15 A tool for static detection of timing channels in Java Lux, Alexander
2011
4 p. 303-313
artikel
16 A trivial debiasing scheme for Helper Data Systems Škorić, Boris
2018
4 p. 341-349
artikel
17 Constant time modular inversion Bos, Joppe W.
2014
4 p. 275-281
artikel
18 Co-$$Z$$ ECC scalar multiplications for hardware, software and hardware–software co-design on embedded systems Baldwin, Brian
2012
4 p. 221-240
artikel
19 Design and validation through a frequency-based metric of a new countermeasure to protect nanometer ICs from side-channel attacks Bongiovanni, Simone
2015
4 p. 269-288
artikel
20 Development of the RISC-V entropy source interface Saarinen, Markku-Juhani O.

4 p. 371-386
artikel
21 Differential fault analysis of NORX using variants of coupon collector problem Jana, Amit

4 p. 433-459
artikel
22 Efficient implementation of generalized Maiorana–McFarland class of cryptographic functions Pasalic, Enes
2016
4 p. 287-295
artikel
23 Electromagnetic fault injection against a complex CPU, toward new micro-architectural fault models Trouchkine, Thomas

4 p. 353-367
artikel
24 Error control scheme for malicious and natural faults in cryptographic modules Gay, Mael

4 p. 321-336
artikel
25 Euclidean addition chains scalar multiplication on curves with efficient endomorphism Dosso, Yssouf
2018
4 p. 351-367
artikel
26 Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware Howe, James

4 p. 317-327
artikel
27 Fast unified elliptic curve point multiplication for NIST prime curves on FPGAs Wu, Tao
2019
4 p. 401-410
artikel
28 Fault analysis of the PRINCE family of lightweight ciphers Kundu, Anup Kumar

4 p. 475-494
artikel
29 Formal fault analysis of branch predictors: attacking countermeasures of asymmetric key ciphers Bhattacharya, Sarani
2017
4 p. 299-310
artikel
30 From cryptography to hardware: analyzing and protecting embedded Xilinx BRAM for cryptographic applications Bhasin, Shivam
2013
4 p. 213-225
artikel
31 Generic power attacks on RSA with CRT and exponent blinding: new results Schindler, Werner
2017
4 p. 255-272
artikel
32 Harder, better, faster, stronger: elliptic curve discrete logarithm computations on FPGAs Wenger, Erich
2015
4 p. 287-297
artikel
33 Hardware attacks: an algebraic approach Moein, Samer
2016
4 p. 325-337
artikel
34 High-speed SABER key encapsulation mechanism in 65nm CMOS Imran, Malik

4 p. 461-471
artikel
35 Improved constant-sum encodings for hash-based signatures Perin, Lucas Pandolfo

4 p. 329-351
artikel
36 Improving accuracy of HPC-based malware classification for embedded platforms using gradient descent optimization Alam, Manaar

4 p. 289-303
artikel
37 Introduction to the PROOFS 2016 special section Homma, Naofumi
2017
4 p. 297-298
artikel
38 Isadora: automated information-flow property generation for hardware security verification Deutschbein, Calvin

4 p. 391-407
artikel
39 Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search Cianfriglia, Marco
2019
4 p. 375-392
artikel
40 Machine learning in side-channel analysis: a first study Hospodar, Gabriel
2011
4 p. 293-302
artikel
41 Message-aimed side channel and fault attacks against public key cryptosystems with homomorphic properties Strenzke, Falko
2011
4 p. 283-292
artikel
42 Montgomery-friendly primes and applications to cryptography Bajard, Jean Claude

4 p. 399-415
artikel
43 New algorithms for batch verification of standard ECDSA signatures Karati, Sabyasachi
2014
4 p. 237-258
artikel
44 On the power of template attacks in highly multivariate context Ouladj, Maamar

4 p. 337-354
artikel
45 Optimal side-channel attacks for multivariate leakages and multiple models Bruneau, Nicolas
2017
4 p. 331-341
artikel
46 Parallelizing message schedules to accelerate the computations of hash functions Gueron, Shay
2012
4 p. 241-253
artikel
47 Physical model of sensitive data leakage from PC-based cryptographic systems Levina, Alla
2019
4 p. 393-400
artikel
48 Power attacks in the presence of exponent blinding Schindler, Werner
2014
4 p. 213-236
artikel
49 Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM Kuroda, Kunihiro

4 p. 427-442
artikel
50 Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest Clavier, Christophe
2014
4 p. 259-274
artikel
51 Programmable access-controlled and generic erasable PUF design and its applications Jin, Chenglu

4 p. 413-432
artikel
52 PROOFS 2018 Editorial Batina, Lejla

4 p. 287
artikel
53 RNS Montgomery reduction algorithms using quadratic residuosity Kawamura, Shinichi
2018
4 p. 313-331
artikel
54 RunFein: a rapid prototyping framework for Feistel and SPN-based block ciphers Khalid, Ayesha
2016
4 p. 299-323
artikel
55 Scan attacks on side-channel and fault attack resistant public-key implementations Da Rolt, Jean
2012
4 p. 207-219
artikel
56 Scan-based side channel attack on stream ciphers and its prevention Karmakar, Sandip
2017
4 p. 327-340
artikel
57 Secret-free security: a survey and tutorial Rührmair, Ulrich

4 p. 387-412
artikel
58 Selecting elliptic curves for cryptography: an efficiency and security analysis Bos, Joppe W.
2015
4 p. 259-286
artikel
59 Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems Avanzi, Roberto
2011
4 p. 271-281
artikel
60 Six shades lighter: a bit-serial implementation of the AES family Roldán Lombardía, Sergio

4 p. 417-439
artikel
61 Some new results on binary polynomial multiplication Cenk, Murat
2015
4 p. 289-303
artikel
62 SPA on Rabin variant with public key $$N=p^2q$$N=p2q Abd Ghafar, Amir Hamzah
2016
4 p. 339-346
artikel
63 Spatial dependency analysis to extract information from side-channel mixtures: extended version Vasselle, Aurélien

4 p. 409-425
artikel
64 SPA vulnerabilities of the binary extended Euclidean algorithm Aldaya, Alejandro Cabrera
2016
4 p. 273-285
artikel
65 Spoofing attacks against vehicular FMCW radar Komissarov, Rony

4 p. 473-484
artikel
66 Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks Kamal, Abdel Alim
2013
4 p. 227-240
artikel
67 Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version Lerman, Liran
2017
4 p. 301-313
artikel
68 Template attack versus Bayes classifier Picek, Stjepan
2017
4 p. 343-351
artikel
69 The ASHES 2020 special issue at JCEN Chang, Chip-Hong

4 p. 369-370
artikel
70 The ASHES 2021 special issue at JCEN Chang, Chip-Hong

4 p. 389-390
artikel
71 The bias–variance decomposition in profiled attacks Lerman, Liran
2015
4 p. 255-267
artikel
72 Throughput-optimized implementations of QUAD Hamlet, Jason R.
2015
4 p. 245-254
artikel
73 Timing attacks and local timing attacks against Barrett’s modular multiplication algorithm Mittmann, Johannes

4 p. 369-397
artikel
74 To infect or not to infect: a critical analysis of infective countermeasures in fault attacks Baksi, Anubhab

4 p. 355-374
artikel
75 Towards efficient and automated side-channel evaluations at design time Šijačić, Danilo

4 p. 305-319
artikel
76 Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version) Krachenfels, Thilo

4 p. 485-499
artikel
77 Uniform Montgomery multiplier Saldamli, Gokay
2019
4 p. 333-339
artikel
78 Using modular extension to provably protect Edwards curves against fault attacks Dugardin, Margaux
2017
4 p. 321-330
artikel
79 Variety enhancement of PUF responses using the locations of random outputting RS latches Yamamoto, Dai
2012
4 p. 197-211
artikel
                             79 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland