The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ASHES@CCS"( http://dblp.L3S.de/Venues/ASHES@CCS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ashes

Publication years (Num. hits)
2017-2018 (23) 2019-2020 (27) 2021-2022 (28) 2023 (15)
Publication types (Num. hits)
inproceedings(86) proceedings(7)
Venues (Conferences, Journals, ...)
ASHES@CCS(93)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 93 publication records. Showing 93 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Shoei Nashimoto, Tomoyuki Nagatsuka Cover Chirp Jaming: Hybrid Jamming-Deception Attack on FMCW Radar and Its Countermeasure. Search on Bibsonomy ASHES@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Madhav Nair, Rajat Sadhukhan, Hammond Pearce, Debdeep Mukhopadhyay, Ramesh Karri Netlist Whisperer: AI and NLP Fight Circuit Leakage! Search on Bibsonomy ASHES@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Shungo Hayashi, Junichi Sakamoto, Masaki Chikano, Tsutomu Matsumoto Effective Layout Design for Laser Fault Sensor on FPGA. Search on Bibsonomy ASHES@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Xhani Marvin Saß, Thilo Krachenfels, Frederik Dermot Pustelnik, Jean-Pierre Seifert, Frank Altmann Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis. Search on Bibsonomy ASHES@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Claire Vishik In Search of Trust: 30 Years of Evolution of Trusted Computing and Hardware Security. Search on Bibsonomy ASHES@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Yanning Ji, Elena Dubrova A Side-Channel Attack on a Masked Hardware Implementation of CRYSTALS-Kyber. Search on Bibsonomy ASHES@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Chip-Hong Chang, Ulrich Rührmair, Lejla Batina, Domenic Forte (eds.) Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, ASHES 2023, Copenhagen, Denmark, 30 November 2023 Search on Bibsonomy ASHES@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Nils Rothaug, Simon Klix, Nicole Auth, Sinan Böcker, Endres Puschner, Steffen Becker 0003, Christof Paar Towards Unsupervised SEM Image Segmentation for IC Layout Extraction. Search on Bibsonomy ASHES@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Tobias Stelzer, Felix Oberhansl, Jonas Schupp, Patrick Karl Enabling Lattice-Based Post-Quantum Cryptography on the OpenTitan Platform. Search on Bibsonomy ASHES@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Alok K. Singh, Ryan M. Gerdes Better Side-Channel Attacks Through Measurements. Search on Bibsonomy ASHES@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Owen Pemberton, David F. Oswald BioLeak: Exploiting Cache Timing to Recover Fingerprint Minutiae Coordinates. Search on Bibsonomy ASHES@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Trevor Yap, Stjepan Picek, Shivam Bhasin Beyond the Last Layer: Deep Feature Loss Functions in Side-channel Analysis. Search on Bibsonomy ASHES@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Hikaru Nishiyama, Daisuke Fujimoto, Yu-ichi Hayashi Remote Fault Injection Attack against Cryptographic Modules via Intentional Electromagnetic Interference from an Antenna. Search on Bibsonomy ASHES@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Ravikanth Pappu Physical Unclonable Functions: The First Fifty Years. Search on Bibsonomy ASHES@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Eduardo Ferrufino, Luke Beckwith, Abubakr Abdulgadir, Jens-Peter Kaps FOBOS 3: An Open-Source Platform for Side-Channel Analysis and Benchmarking. Search on Bibsonomy ASHES@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Raphael Viera 0001, Jean-Max Dutertre, Rodrigo Silva Lima Injecting Permanent Faults into the Flash Memory of a Microcontroller with Laser Illumination During Read Operations. Search on Bibsonomy ASHES@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Muayad J. Aljafar, Florence Azaïs, Marie-Lise Flottes, Samuel Pagliarini Leveraging Layout-based Effects for Locking Analog ICs. Search on Bibsonomy ASHES@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Yuval Yarom Automating Cryptographic Code Generation. Search on Bibsonomy ASHES@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Milad Seddigh, Mahdi Esfahani, Sarani Bhattacharya, Mohammad Reza Aref, Hadi Soleimany Breaking KASLR on Mobile Devices without Any Use of Cache Memory. Search on Bibsonomy ASHES@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jens Trautmann 0001, Nikolaos Patsiatzis, Andreas Becher, Stefan Wildermann, Jürgen Teich Putting IMT to the Test: Revisiting and Expanding Interval Matching Techniques and their Calibration for SCA. Search on Bibsonomy ASHES@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Furkan Aydin, Aydin Aysu Exposing Side-Channel Leakage of SEAL Homomorphic Encryption Library. Search on Bibsonomy ASHES@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Lars Tebelmann, Moritz Wettermann, Michael Pehl On-Chip Side-Channel Analysis of the Loop PUF. Search on Bibsonomy ASHES@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Amit Choudhari, Sylvain Guilley, Khaled Karray SpecDefender: Transient Execution Attack Defender using Performance Counters. Search on Bibsonomy ASHES@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Emre Karabulut, Chandu Yuvarajappa, Mohammed Iliyas Shaik, Seetal Potluri, Amro Awad, Aydin Aysu PR Crisis: Analyzing and Fixing Partial Reconfiguration in Multi-Tenant Cloud FPGAs. Search on Bibsonomy ASHES@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Marziyeh Rezaei, Liban Hussein, Sajjad Moazeni Secure FMCW LiDAR Systems with Frequency Encryption. Search on Bibsonomy ASHES@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Alexander Wagner, Felix Oberhansl, Marc Schink To Be, or Not to Be Stateful: Post-Quantum Secure Boot using Hash-Based Signatures. Search on Bibsonomy ASHES@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Amit Jana, Goutam Paul 0001 Differential Fault Attack on PHOTON-Beetle. Search on Bibsonomy ASHES@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Chip-Hong Chang, Ulrich Rührmair, Debdeep Mukhopadhyay, Domenic Forte (eds.) Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security, ASHES 2022, Los Angeles, CA, USA, 11 November 2022 Search on Bibsonomy ASHES@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Marten van Dijk Towards Remote Verifiable Computation without Digital Secrets. Search on Bibsonomy ASHES@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Erland Wittkotter WaC: Trustworthy Encryption and Communication in an IT Ecosystem with Artificial Superintelligence. Search on Bibsonomy ASHES@CCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ruby B. Lee Speculative Execution Attacks and Hardware Defenses. Search on Bibsonomy ASHES@CCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Thilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging. Search on Bibsonomy ASHES@CCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Wenye Liu, Chip-Hong Chang A Forward Error Compensation Approach for Fault Resilient Deep Neural Network Accelerator Design. Search on Bibsonomy ASHES@CCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Farinaz Koushanfar Machine Learning on Encrypted Data: Hardware to the Rescue. Search on Bibsonomy ASHES@CCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Rony Komissarov, Avishai Wool Spoofing Attacks Against Vehicular FMCW Radar. Search on Bibsonomy ASHES@CCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Malik Imran, Felipe Almeida, Jaan Raik, Andrea Basso 0002, Sujoy Sinha Roy, Samuel Pagliarini Design Space Exploration of SABER in 65nm ASIC. Search on Bibsonomy ASHES@CCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Tatsuya Oyama, Shunsuke Okura, Kota Yoshida, Takeshi Fujino Backdoor Attack on Deep Neural Networks Triggered by Fault Injection Attack on Image Sensor Interface. Search on Bibsonomy ASHES@CCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Kalle Ngo, Elena Dubrova, Thomas Johansson 0001 Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis. Search on Bibsonomy ASHES@CCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Calvin Deutschbein, Andres Meza 0001, Francesco Restuccia 0002, Ryan Kastner, Cynthia Sturton Isadora: Automated Information Flow Property Generation for Hardware Designs. Search on Bibsonomy ASHES@CCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino Practical Aspects on Non-profiled Deep-learning Side-channel Attacks against AES Software Implementation with Two Types of Masking Countermeasures including RSM. Search on Bibsonomy ASHES@CCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Aurélien Vasselle, Hugues Thiebeauld, Philippe Maurine Spatial Dependency Analysis to Extract Information from Side-Channel Mixtures. Search on Bibsonomy ASHES@CCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Chip-Hong Chang, Ulrich Rührmair, Stefan Katzenbeisser 0001, Debdeep Mukhopadhyay (eds.) ASHES@CCS 2021: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, Virtual Event, Republic of Korea, 19 November 2021 Search on Bibsonomy ASHES@CCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yoo-Seung Won, Soham Chatterjee, Dirmanto Jap, Arindam Basu, Shivam Bhasin WaC: First Results on Practical Side-Channel Attacks on Commercial Machine Learning Accelerator. Search on Bibsonomy ASHES@CCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Mark M. Tehranipoor The Pursuit of Happiness: Establishing Hardware Root-of-Trust for Cyber Security. Search on Bibsonomy ASHES@CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Çetin Kaya Koç Formidable Challenges in Hardware Implementations of Fully Homomorphic Encryption Functions for Applications in Machine Learning. Search on Bibsonomy ASHES@CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jacob Fustos, Michael Garrett Bechtel, Heechul Yun SpectreRewind: Leaking Secrets to Past Instructions. Search on Bibsonomy ASHES@CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ruize Wang, Huanyu Wang, Elena Dubrova Far Field EM Side-Channel Attack on AES Using Deep Learning. Search on Bibsonomy ASHES@CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Chenglu Jin, Wayne P. Burleson, Marten van Dijk, Ulrich Rührmair Erasable PUFs: Formal Treatment and Generic Design. Search on Bibsonomy ASHES@CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Amit Jana, Dhiman Saha, Goutam Paul 0001 Differential Fault Analysis of NORX. Search on Bibsonomy ASHES@CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Chip-Hong Chang, Ulrich Rührmair, Stefan Katzenbeisser 0001, Patrick Schaumont (eds.) Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES@CCS 2020, Virtual Event, USA, November 13, 2020 Search on Bibsonomy ASHES@CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ulrich Rührmair SoK: Towards Secret-Free Security. Search on Bibsonomy ASHES@CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Markku-Juhani O. Saarinen, G. Richard Newell, Ben Marshall Building a Modern TRNG: An Entropy Source Interface for RISC-V. Search on Bibsonomy ASHES@CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Adam Hastings, Simha Sethumadhavan WaC: A New Doctrine for Hardware Security. Search on Bibsonomy ASHES@CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sree Ranjani Rajendran, Rijoy Mukherjee, Rajat Subhra Chakraborty SoK: Physical and Logic Testing Techniques for Hardware Trojan Detection. Search on Bibsonomy ASHES@CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mitsuru Shiozaki, Takeshi Sugawara 0001, Takeshi Fujino Exploring Effect of Residual Electric Charges on Cryptographic Circuits. Search on Bibsonomy ASHES@CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Aikata, Banashri Karmakar, Dhiman Saha PRINCE under Differential Fault Attack: Now in 3D. Search on Bibsonomy ASHES@CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Javad Bahrami, Viet Ba Dang, Abubakr Abdulgadir, Khaled N. Khasawneh, Jens-Peter Kaps, Kris Gaj Lightweight Implementation of the LowMC Block Cipher Protected Against Side-Channel Attacks. Search on Bibsonomy ASHES@CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mathieu Gross, Nisha Jacob, Andreas Zankl, Georg Sigl Breaking TrustZone Memory Isolation through Malicious Hardware on a Modern FPGA-SoC. Search on Bibsonomy ASHES@CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Keyvan Ramezanpour, Paul Ampadu, William Diehl Fault Intensity Map Analysis with Neural Network Key Distinguisher. Search on Bibsonomy ASHES@CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1François-Xavier Standaert Towards an Open Approach to Side-Channel Resistant Authenticated Encryption. Search on Bibsonomy ASHES@CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Aurélien Vasselle, Philippe Maurine, Maxime Cozzi Breaking Mobile Firmware Encryption through Near-Field Side-Channel Analysis. Search on Bibsonomy ASHES@CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Noriyuki Miura, Tatsuya Machida, Kohei Matsuda, Makoto Nagata, Shoei Nashimoto, Daisuke Suzuki A Low-Cost Replica-Based Distance-Spoofing Attack on mmWave FMCW Radar. Search on Bibsonomy ASHES@CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Bodo Selmke, Florian Hauschild, Johannes Obermaier Peak Clock: Fault Injection into PLL-Based Systems via Clock Manipulation. Search on Bibsonomy ASHES@CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Florian Unterstein, Nisha Jacob, Neil Hanley, Chongyan Gu, Johann Heyszl SCA Secure and Updatable Crypto Engines for FPGA SoC Bitstream Decryption. Search on Bibsonomy ASHES@CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Leonid Azriel, Ran Ginosar, Avi Mendelson SoK: An Overview of Algorithmic Methods in IC Reverse Engineering. Search on Bibsonomy ASHES@CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Chip-Hong Chang, Ulrich Rührmair, Daniel E. Holcomb, Patrick Schaumont (eds.) Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES@CCS 2019, London, UK, November 15, 2019. Search on Bibsonomy ASHES@CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mitsuru Shiozaki, Takeshi Fujino Simple Electromagnetic Analysis Attacks based on Geometric Leak on an ASIC Implementation of Ring-Oscillator PUF. Search on Bibsonomy ASHES@CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Chongyan Gu, Chip-Hong Chang, Weiqiang Liu 0001, Neil Hanley, Jack Miskelly, Máire O'Neill A Large Scale Comprehensive Evaluation of Single-Slice Ring Oscillator and PicoPUF Bit Cells on 28nm Xilinx FPGAs. Search on Bibsonomy ASHES@CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sahan Bandara, Michel A. Kinsy Adaptive Caches as a Defense Mechanism Against Cache Side-Channel Attacks. Search on Bibsonomy ASHES@CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yuqiao Zhang, Pinchen Cui, Ziqi Zhou, Ujjwal Guin TGA: An Oracle-less and Topology-Guided Attack on Logic Locking. Search on Bibsonomy ASHES@CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yuan Yao, Patrick Schaumont A Low-cost Function Call Protection Mechanism Against Instruction Skip Fault Attacks. Search on Bibsonomy ASHES@CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhenkai Zhang, Zihao Zhan, Daniel Balasubramanian, Xenofon D. Koutsoukos, Gabor Karsai Triggering Rowhammer Hardware Faults on ARM: A Revisit. Search on Bibsonomy ASHES@CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zdenek Martinasek, Jan Hajny, David Smekal, Lukas Malina, Denis Matousek, Michal Kekely, Nele Mentens 200 Gbps Hardware Accelerated Encryption System for FPGA Network Cards. Search on Bibsonomy ASHES@CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson 0001, Hossein Shirazi, Indrakshi Ray, Indrajit Ray Behavioral Fingerprinting of IoT Devices. Search on Bibsonomy ASHES@CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Marc Joye, Yan Michalevsky RSA Signatures Under Hardware Restrictions. Search on Bibsonomy ASHES@CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Olivier Bronchain, Louis Dassy, Sebastian Faust, François-Xavier Standaert Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components Designed by Colluding Manufacturers. Search on Bibsonomy ASHES@CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mauricio Gutierrez, Ziming Zhao 0001, Adam Doupé, Yan Shoshitaishvili, Gail-Joon Ahn CacheLight: Defeating the CacheKit Attack. Search on Bibsonomy ASHES@CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chip-Hong Chang, Ulrich Rührmair, Daniel E. Holcomb, Jorge Guajardo (eds.) Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, ASHES@CCS 2018, Toronto, ON, Canada, October 19, 2018 Search on Bibsonomy ASHES@CCS The full citation details ... 2018 DBLP  BibTeX  RDF
1Alexander Glaser Hardware Security at the Limit: Nuclear Verification and Arms Control. Search on Bibsonomy ASHES@CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Srdjan Capkun Secure Positioning and Location-Based Security for IoT and Beyond. Search on Bibsonomy ASHES@CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohammad Shahrad, Arsalan Mosenia, Liwei Song, Mung Chiang, David Wentzlaff, Prateek Mittal Acoustic Denial of Service Attacks on Hard Disk Drives. Search on Bibsonomy ASHES@CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1William Diehl, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj Fixing the CLOC with Fine-grain Leakage Analysis. Search on Bibsonomy ASHES@CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dina Kamel, Davide Bellizia, François-Xavier Standaert, Denis Flandre, David Bol Demonstrating an LPPN Processor. Search on Bibsonomy ASHES@CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hoda Maleki, Reza Rahaeimehr, Marten van Dijk SoK: RFID-based Clone Detection Mechanisms for Supply Chains. Search on Bibsonomy ASHES@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chip-Hong Chang, Ulrich Rührmair, Wei Zhang 0012 (eds.) Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, ASHES@CCS 2017, Dallas, TX, USA, November 3, 2017 Search on Bibsonomy ASHES@CCS The full citation details ... 2017 DBLP  BibTeX  RDF
1Yan Michalevsky, Yonatan Winetraub WaC: SpaceTEE - Secure and Tamper-Proof Computing in Space using CubeSats. Search on Bibsonomy ASHES@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Charles Suslowicz, Archanaa S. Krishnan, Patrick Schaumont Optimizing Cryptography in Energy Harvesting Applications. Search on Bibsonomy ASHES@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Úlfar Erlingsson Data-driven Software Security and its Hardware Support. Search on Bibsonomy ASHES@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lars Tebelmann, Michael Pehl, Georg Sigl EM Side-Channel Analysis of BCH-based Error Correction for PUF-based Key Generation. Search on Bibsonomy ASHES@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Jeyavijayan Rajendran, Ramesh Karri, Nasir D. Memon Boolean Circuit Camouflage: Cryptographic Models, Limitations, Provable Results and a Random Oracle Realization. Search on Bibsonomy ASHES@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Srinivas Devadas Secure Hardware and Cryptography: Contrasts, Synergies and Challenges. Search on Bibsonomy ASHES@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Varnavas Papaioannou, Nicolas T. Courtois On Feasibility and Performance of Rowhammmer Attack. Search on Bibsonomy ASHES@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahmad-Reza Sadeghi Hardware-Assisted Security: Promises, Pitfalls and Opportunities. Search on Bibsonomy ASHES@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #93 of 93 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license