The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Safe-Error (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1997-2016 (15) 2017-2023 (7)
Publication types (Num. hits)
article(5) inproceedings(17)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 14 occurrences of 13 keywords

Results
Found 22 publication records. Showing 22 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
34Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Bruno Robisson, Pascal Manet Differential Behavioral Analysis. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Differential Behavioral Analysis, Safe-Error, Block Ciphers, AES, Differential Power Analysis, Fault Attacks
28Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Square-multiply exponentiation, Cryptography, Side channel attack, Exponentiation, Timing attack, Power analysis attack, Physical cryptanalysis, Hardware fault cryptanalysis
26Chih-Chung Lu, Shau-Yin Tseng, Szu-Kai Huang A Secure Modular Exponential Algorithm Resists to Power, Timing, C Safe Error and M Safe Error Attacks. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Marc Joye Highly Regular m-Ary Powering Ladders. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Montgomery ladder, SPA-type attacks, safe-error attacks, Exponentiation algorithms
13Kevin Hector, Pierre-Alain Moëllic, Mathieu Dumont, Jean-Max Dutertre Fault Injection and Safe-Error Attack for Extraction of Embedded Neural Network Models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Kevin Hector, Pierre-Alain Moëllic, Jean-Max Dutertre, Mathieu Dumont Fault Injection and Safe-Error Attack for Extraction of Embedded Neural Network Models. Search on Bibsonomy ESORICS Workshops (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Fabio Campos, Juliane Krämer, Marcel Müller Safe-Error Attacks on SIKE and CSIDH. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
13Luk Bettale, Simon Montoya, Guénaël Renault Safe-Error Analysis of Post-Quantum Cryptography Mechanisms. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
13Fabio Campos, Juliane Krämer, Marcel Müller Safe-Error Attacks on SIKE and CSIDH. Search on Bibsonomy SPACE The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Luk Bettale, Simon Montoya, Guénaël Renault Safe-Error Analysis of Post-Quantum Cryptography Mechanisms - Short Paper-. Search on Bibsonomy FDTC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
13Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
13Miguel Oliveira e Silva, Pedro G. Francisco Contract-Java: Design by Contract in Java with Safe Error Handling. Search on Bibsonomy SLATE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
13Dusko Karaklajic, Junfeng Fan, Ingrid Verbauwhede A systematic M safe-error detection in hardware implementations of cryptographic algorithms. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
13Dusko Karaklajic, Junfeng Fan, Ingrid Verbauwhede Systematic security evaluation method against C safe-error attacks. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
11JeaHoon Park, KiSeok Bae, Sang-Jae Moon, Dooho Choi, You Sung Kang, JaeCheol Ha A new fault cryptanalysis on montgomery ladder exponentiation algorithm. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Montgomery ladder exponentiation algorithm, fault analysis attack, RSA, physical cryptanalysis
7Jörn-Marc Schmidt, Christoph Herbst A Practical Fault Attack on Square and Multiply. Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
7Chong Hee Kim, Jean-Jacques Quisquater How can we overcome both side channel analysis and fault attacks on RSA-CRT? Search on Bibsonomy FDTC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
7Frédéric Muller, Frédéric Valette High-Order Attacks Against the Exponent Splitting Protection. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
7ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, Sung-Ming Yen, Sung-Hyun Kim A CRT-Based RSA Countermeasure Against Physical Cryptanalysis. Search on Bibsonomy HPCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
7Hans-Jürgen Dobner, Stefan Ritter Attacking a Conjecture in Mathematical Physics by Combining Methods of Computational Analysis and Scientific Computing. Search on Bibsonomy Reliab. Comput. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #22 of 22 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license