nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A class of safe and efficient binary Edwards curves
|
Farias, Luckas A. |
|
2018 |
|
4 |
p. 271-283 |
artikel |
2 |
A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention
|
Mukherjee, Rijoy |
|
|
|
4 |
p. 495-522 |
artikel |
3 |
A framework for leaking secrets to past instructions
|
Fustos, Jacob |
|
|
|
4 |
p. 461-473 |
artikel |
4 |
A new class of irreducible pentanomials for polynomial-based multipliers in binary fields
|
Banegas, Gustavo |
|
2018 |
|
4 |
p. 359-373 |
artikel |
5 |
A new method of black box power analysis and a fast algorithm for optimal key search
|
Dichtl, Markus |
|
2011 |
|
4 |
p. 255-264 |
artikel |
6 |
An on-chip glitchy-clock generator for testing fault injection attacks
|
Endo, Sho |
|
2011 |
|
4 |
p. 265-270 |
artikel |
7 |
Another dimension in integrated circuit trust
|
DeVale, John |
|
2017 |
|
4 |
p. 315-326 |
artikel |
8 |
A practical device authentication scheme using SRAM PUFs
|
Koeberl, Patrick |
|
2012 |
|
4 |
p. 255-269 |
artikel |
9 |
Arithmetic of $$\tau $$τ-adic expansions for lightweight Koblitz curve cryptography
|
Järvinen, Kimmo |
|
2018 |
|
4 |
p. 285-300 |
artikel |
10 |
A side-channel attack on a masked and shuffled software implementation of Saber
|
Ngo, Kalle |
|
|
|
4 |
p. 443-460 |
artikel |
11 |
A statistics-based success rate model for DPA and CPA
|
Fei, Yunsi |
|
2015 |
|
4 |
p. 227-243 |
artikel |
12 |
A study on analyzing side-channel resistant encoding schemes with respect to fault attacks
|
Breier, Jakub |
|
2017 |
|
4 |
p. 311-320 |
artikel |
13 |
A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards
|
Danger, Jean-Luc |
|
2013 |
|
4 |
p. 241-265 |
artikel |
14 |
A toolbox for software optimization of QC-MDPC code-based cryptosystems
|
Drucker, Nir |
|
2019 |
|
4 |
p. 341-357 |
artikel |
15 |
A tool for static detection of timing channels in Java
|
Lux, Alexander |
|
2011 |
|
4 |
p. 303-313 |
artikel |
16 |
A trivial debiasing scheme for Helper Data Systems
|
Škorić, Boris |
|
2018 |
|
4 |
p. 341-349 |
artikel |
17 |
Constant time modular inversion
|
Bos, Joppe W. |
|
2014 |
|
4 |
p. 275-281 |
artikel |
18 |
Co-$$Z$$ ECC scalar multiplications for hardware, software and hardware–software co-design on embedded systems
|
Baldwin, Brian |
|
2012 |
|
4 |
p. 221-240 |
artikel |
19 |
Design and validation through a frequency-based metric of a new countermeasure to protect nanometer ICs from side-channel attacks
|
Bongiovanni, Simone |
|
2015 |
|
4 |
p. 269-288 |
artikel |
20 |
Development of the RISC-V entropy source interface
|
Saarinen, Markku-Juhani O. |
|
|
|
4 |
p. 371-386 |
artikel |
21 |
Differential fault analysis of NORX using variants of coupon collector problem
|
Jana, Amit |
|
|
|
4 |
p. 433-459 |
artikel |
22 |
Efficient implementation of generalized Maiorana–McFarland class of cryptographic functions
|
Pasalic, Enes |
|
2016 |
|
4 |
p. 287-295 |
artikel |
23 |
Electromagnetic fault injection against a complex CPU, toward new micro-architectural fault models
|
Trouchkine, Thomas |
|
|
|
4 |
p. 353-367 |
artikel |
24 |
Error control scheme for malicious and natural faults in cryptographic modules
|
Gay, Mael |
|
|
|
4 |
p. 321-336 |
artikel |
25 |
Euclidean addition chains scalar multiplication on curves with efficient endomorphism
|
Dosso, Yssouf |
|
2018 |
|
4 |
p. 351-367 |
artikel |
26 |
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware
|
Howe, James |
|
|
|
4 |
p. 317-327 |
artikel |
27 |
Fast unified elliptic curve point multiplication for NIST prime curves on FPGAs
|
Wu, Tao |
|
2019 |
|
4 |
p. 401-410 |
artikel |
28 |
Fault analysis of the PRINCE family of lightweight ciphers
|
Kundu, Anup Kumar |
|
|
|
4 |
p. 475-494 |
artikel |
29 |
Formal fault analysis of branch predictors: attacking countermeasures of asymmetric key ciphers
|
Bhattacharya, Sarani |
|
2017 |
|
4 |
p. 299-310 |
artikel |
30 |
From cryptography to hardware: analyzing and protecting embedded Xilinx BRAM for cryptographic applications
|
Bhasin, Shivam |
|
2013 |
|
4 |
p. 213-225 |
artikel |
31 |
Generic power attacks on RSA with CRT and exponent blinding: new results
|
Schindler, Werner |
|
2017 |
|
4 |
p. 255-272 |
artikel |
32 |
Harder, better, faster, stronger: elliptic curve discrete logarithm computations on FPGAs
|
Wenger, Erich |
|
2015 |
|
4 |
p. 287-297 |
artikel |
33 |
Hardware attacks: an algebraic approach
|
Moein, Samer |
|
2016 |
|
4 |
p. 325-337 |
artikel |
34 |
High-speed SABER key encapsulation mechanism in 65nm CMOS
|
Imran, Malik |
|
|
|
4 |
p. 461-471 |
artikel |
35 |
Improved constant-sum encodings for hash-based signatures
|
Perin, Lucas Pandolfo |
|
|
|
4 |
p. 329-351 |
artikel |
36 |
Improving accuracy of HPC-based malware classification for embedded platforms using gradient descent optimization
|
Alam, Manaar |
|
|
|
4 |
p. 289-303 |
artikel |
37 |
Introduction to the PROOFS 2016 special section
|
Homma, Naofumi |
|
2017 |
|
4 |
p. 297-298 |
artikel |
38 |
Isadora: automated information-flow property generation for hardware security verification
|
Deutschbein, Calvin |
|
|
|
4 |
p. 391-407 |
artikel |
39 |
Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search
|
Cianfriglia, Marco |
|
2019 |
|
4 |
p. 375-392 |
artikel |
40 |
Machine learning in side-channel analysis: a first study
|
Hospodar, Gabriel |
|
2011 |
|
4 |
p. 293-302 |
artikel |
41 |
Message-aimed side channel and fault attacks against public key cryptosystems with homomorphic properties
|
Strenzke, Falko |
|
2011 |
|
4 |
p. 283-292 |
artikel |
42 |
Montgomery-friendly primes and applications to cryptography
|
Bajard, Jean Claude |
|
|
|
4 |
p. 399-415 |
artikel |
43 |
New algorithms for batch verification of standard ECDSA signatures
|
Karati, Sabyasachi |
|
2014 |
|
4 |
p. 237-258 |
artikel |
44 |
On the power of template attacks in highly multivariate context
|
Ouladj, Maamar |
|
|
|
4 |
p. 337-354 |
artikel |
45 |
Optimal side-channel attacks for multivariate leakages and multiple models
|
Bruneau, Nicolas |
|
2017 |
|
4 |
p. 331-341 |
artikel |
46 |
Parallelizing message schedules to accelerate the computations of hash functions
|
Gueron, Shay |
|
2012 |
|
4 |
p. 241-253 |
artikel |
47 |
Physical model of sensitive data leakage from PC-based cryptographic systems
|
Levina, Alla |
|
2019 |
|
4 |
p. 393-400 |
artikel |
48 |
Power attacks in the presence of exponent blinding
|
Schindler, Werner |
|
2014 |
|
4 |
p. 213-236 |
artikel |
49 |
Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM
|
Kuroda, Kunihiro |
|
|
|
4 |
p. 427-442 |
artikel |
50 |
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
|
Clavier, Christophe |
|
2014 |
|
4 |
p. 259-274 |
artikel |
51 |
Programmable access-controlled and generic erasable PUF design and its applications
|
Jin, Chenglu |
|
|
|
4 |
p. 413-432 |
artikel |
52 |
PROOFS 2018 Editorial
|
Batina, Lejla |
|
|
|
4 |
p. 287 |
artikel |
53 |
RNS Montgomery reduction algorithms using quadratic residuosity
|
Kawamura, Shinichi |
|
2018 |
|
4 |
p. 313-331 |
artikel |
54 |
RunFein: a rapid prototyping framework for Feistel and SPN-based block ciphers
|
Khalid, Ayesha |
|
2016 |
|
4 |
p. 299-323 |
artikel |
55 |
Scan attacks on side-channel and fault attack resistant public-key implementations
|
Da Rolt, Jean |
|
2012 |
|
4 |
p. 207-219 |
artikel |
56 |
Scan-based side channel attack on stream ciphers and its prevention
|
Karmakar, Sandip |
|
2017 |
|
4 |
p. 327-340 |
artikel |
57 |
Secret-free security: a survey and tutorial
|
Rührmair, Ulrich |
|
|
|
4 |
p. 387-412 |
artikel |
58 |
Selecting elliptic curves for cryptography: an efficiency and security analysis
|
Bos, Joppe W. |
|
2015 |
|
4 |
p. 259-286 |
artikel |
59 |
Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems
|
Avanzi, Roberto |
|
2011 |
|
4 |
p. 271-281 |
artikel |
60 |
Six shades lighter: a bit-serial implementation of the AES family
|
Roldán Lombardía, Sergio |
|
|
|
4 |
p. 417-439 |
artikel |
61 |
Some new results on binary polynomial multiplication
|
Cenk, Murat |
|
2015 |
|
4 |
p. 289-303 |
artikel |
62 |
SPA on Rabin variant with public key $$N=p^2q$$N=p2q
|
Abd Ghafar, Amir Hamzah |
|
2016 |
|
4 |
p. 339-346 |
artikel |
63 |
Spatial dependency analysis to extract information from side-channel mixtures: extended version
|
Vasselle, Aurélien |
|
|
|
4 |
p. 409-425 |
artikel |
64 |
SPA vulnerabilities of the binary extended Euclidean algorithm
|
Aldaya, Alejandro Cabrera |
|
2016 |
|
4 |
p. 273-285 |
artikel |
65 |
Spoofing attacks against vehicular FMCW radar
|
Komissarov, Rony |
|
|
|
4 |
p. 473-484 |
artikel |
66 |
Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks
|
Kamal, Abdel Alim |
|
2013 |
|
4 |
p. 227-240 |
artikel |
67 |
Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version
|
Lerman, Liran |
|
2017 |
|
4 |
p. 301-313 |
artikel |
68 |
Template attack versus Bayes classifier
|
Picek, Stjepan |
|
2017 |
|
4 |
p. 343-351 |
artikel |
69 |
The ASHES 2020 special issue at JCEN
|
Chang, Chip-Hong |
|
|
|
4 |
p. 369-370 |
artikel |
70 |
The ASHES 2021 special issue at JCEN
|
Chang, Chip-Hong |
|
|
|
4 |
p. 389-390 |
artikel |
71 |
The bias–variance decomposition in profiled attacks
|
Lerman, Liran |
|
2015 |
|
4 |
p. 255-267 |
artikel |
72 |
Throughput-optimized implementations of QUAD
|
Hamlet, Jason R. |
|
2015 |
|
4 |
p. 245-254 |
artikel |
73 |
Timing attacks and local timing attacks against Barrett’s modular multiplication algorithm
|
Mittmann, Johannes |
|
|
|
4 |
p. 369-397 |
artikel |
74 |
To infect or not to infect: a critical analysis of infective countermeasures in fault attacks
|
Baksi, Anubhab |
|
|
|
4 |
p. 355-374 |
artikel |
75 |
Towards efficient and automated side-channel evaluations at design time
|
Šijačić, Danilo |
|
|
|
4 |
p. 305-319 |
artikel |
76 |
Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)
|
Krachenfels, Thilo |
|
|
|
4 |
p. 485-499 |
artikel |
77 |
Uniform Montgomery multiplier
|
Saldamli, Gokay |
|
2019 |
|
4 |
p. 333-339 |
artikel |
78 |
Using modular extension to provably protect Edwards curves against fault attacks
|
Dugardin, Margaux |
|
2017 |
|
4 |
p. 321-330 |
artikel |
79 |
Variety enhancement of PUF responses using the locations of random outputting RS latches
|
Yamamoto, Dai |
|
2012 |
|
4 |
p. 197-211 |
artikel |