|
Conferences in DBLP
Faster and Timing-Attack Resistant AES-GCM. [Citation Graph (, )][DBLP]
Accelerating AES with Vector Permute Instructions. [Citation Graph (, )][DBLP]
SSE Implementation of Multivariate PKCs on Modern x86 CPUs. [Citation Graph (, )][DBLP]
MicroEliece: McEliece for Embedded Devices. [Citation Graph (, )][DBLP]
Physical Unclonable Functions and Secure Processors. [Citation Graph (, )][DBLP]
Practical Electromagnetic Template Attack on HMAC. [Citation Graph (, )][DBLP]
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure. [Citation Graph (, )][DBLP]
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA. [Citation Graph (, )][DBLP]
Differential Cluster Analysis. [Citation Graph (, )][DBLP]
Known-Plaintext-Only Attack on RSA-CRT with Montgomery Multiplication. [Citation Graph (, )][DBLP]
A New Side-Channel Attack on RSA Prime Generation. [Citation Graph (, )][DBLP]
An Efficient Method for Random Delay Generation in Embedded Software. [Citation Graph (, )][DBLP]
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers. [Citation Graph (, )][DBLP]
A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques. [Citation Graph (, )][DBLP]
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions. [Citation Graph (, )][DBLP]
Crypto Engineering: Some History and Some Case Studies. [Citation Graph (, )][DBLP]
Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers. [Citation Graph (, )][DBLP]
Faster -Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves. [Citation Graph (, )][DBLP]
Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves. [Citation Graph (, )][DBLP]
KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers. [Citation Graph (, )][DBLP]
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security. [Citation Graph (, )][DBLP]
Elliptic Curve Scalar Multiplication Combining Yao's Algorithm and Double Bases. [Citation Graph (, )][DBLP]
The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators. [Citation Graph (, )][DBLP]
Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs. [Citation Graph (, )][DBLP]
CDs Have Fingerprints Too. [Citation Graph (, )][DBLP]
The State-of-the-Art in IC Reverse Engineering. [Citation Graph (, )][DBLP]
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering. [Citation Graph (, )][DBLP]
MERO: A Statistical Approach for Hardware Trojan Detection. [Citation Graph (, )][DBLP]
On Tamper-Resistance from a Theoretical Viewpoint. [Citation Graph (, )][DBLP]
Mutual Information Analysis: How, When and Why?. [Citation Graph (, )][DBLP]
Fault Attacks on RSA Signatures with Partially Unknown Messages. [Citation Graph (, )][DBLP]
Differential Fault Analysis on DES Middle Rounds. [Citation Graph (, )][DBLP]
|