The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CS2@HiPEAC"( http://dblp.L3S.de/Venues/CS2@HiPEAC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/hipeac

Publication years (Num. hits)
2014 (10) 2015 (10) 2016 (11) 2017 (7) 2018 (7)
Publication types (Num. hits)
inproceedings(40) proceedings(5)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 45 publication records. Showing 45 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Flavio D. Garcia Automotive Cyber Security: Lessons Learned and Research Challenges. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Luciano Bozzi, Lorenzo Di Giuseppe, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci, Walter Tiberti TinyWIDS: a WPM-based Intrusion Detection System for TinyOS2.x/802.15.4 Wireless Sensor Networks. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Felipe Valencia, Tobias Oder, Tim Güneysu, Francesco Regazzoni 0001 Exploring the Vulnerability of R-LWE Encryption to Fault Attacks. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alessandro Di Federico rev.ng: A Tale of Reverse Engineering, Dynamic Analysis and Translation of Binaries Using QEMU and LLVM. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Damien Couroussé, Thierno Barry, Bruno Robisson, Nicolas Belleville, Philippe Jaillon, Olivier Potin, Hélène Le Bouder, Jean-Louis Lanet, Karine Heydemann All paths lead to Rome: Polymorphic Runtime Code Generation for Embedded Systems. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Halil Kemal Taskin, Murat Cenk Speeding up Curve25519 using Toeplitz Matrix-vector Multiplication. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1John Goodacre, Mikel Luján, Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi (eds.) Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, CS2 2018, Manchester, United Kingdom, January 24, 2018 Search on Bibsonomy CS2@HiPEAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hermann Seuschek, Fabrizio De Santis, Oscar M. Guillen Side-channel leakage aware instruction scheduling. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Karim M. Abdellatif, Damien Couroussé, Olivier Potin, Philippe Jaillon Filtering-based CPA: a successful side-channel attack against desynchronization countermeasures. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sha Tao, Elena Dubrova Reliable low-overhead arbiter-based physical unclonable functions for resource-constrained IoT devices. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Florian Wilde Large scale characterization of SRAM on infineon XMC microcontrollers as PUF. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Frank K. Gürkaynak, Robert Schilling, Michael Muehlberghuber, Francesco Conti 0001, Stefan Mangard, Luca Benini Multi-core data analytics SoC with a flexible 1.76 Gbit/s AES-XTS cryptographic accelerator in 65 nm CMOS. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Miraje Gentilal, Paulo Martins 0002, Leonel Sousa TrustZone-backed bitcoin wallet. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mats Brorsson, Zhonghai Lu, Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi (eds.) Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2017, Stockholm, Sweden, January 24, 2017 Search on Bibsonomy CS2@HiPEAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sandhya Koteshwara, Chris H. Kim, Keshab K. Parhi Mode-based Obfuscation using Control-Flow Modifications. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Venu Nalla, Rajeev Anand Sahu, Vishal Saraswat Differential Fault Attack on SIMECK. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Apostolos P. Fournaris, Nicolas Sklavos 0001, Christos Koulamas A High Speed Scalar Multiplier for Binary Edwards Curves. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Thierno Barry, Damien Couroussé, Bruno Robisson Compilation of a Countermeasure Against Instruction-Skip Fault Attacks. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Noemie Beringuier-Boher, Marc Lacruche, David El-Baze, Jean-Max Dutertre, Jean-Baptiste Rigaud, Philippe Maurine Body Biasing Injection Attacks in Practice. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ahmed Saeed 0003, Ali Ahmadinia, Mike Just Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Karim M. Abdellatif, Roselyne Chotin-Avot, Habib Mehrez AEGIS-Based Efficient Solution for Secure Reconfiguration of FPGAs. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hermann Seuschek, Johann Heyszl, Fabrizio De Santis A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Reza Azarderakhsh, Koray Karabina Efficient Algorithms and Architectures for Double Point Multiplication on Elliptic Curves. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vincent Immler, Maxim Hennig, Ludwig Kürzinger, Georg Sigl Practical Aspects of Quantization and Tamper-Sensitivity for Physically Obfuscated Keys. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Martin Palkovic, Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi (eds.) Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20, 2016 Search on Bibsonomy CS2@HiPEAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mathieu Carbone, Yannick Teglia, Philippe Maurine, Gilles R. Ducharme Interest of MIA in frequency domain? Search on Bibsonomy CS2@HiPEAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohsen Toorani On Continuous After-the-Fact Leakage-Resilient Key Exchange. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alexander Herrmann, Marc Stöttinger Evaluation Tools for Multivariate Side-Channel Analysis. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Andy D. Pimentel, Stephan Wong, Gerardo Pelosi, Israel Koren, Giovanni Agosta, Alessandro Barenghi (eds.) Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015 Search on Bibsonomy CS2@HiPEAC The full citation details ... 2015 DBLP  BibTeX  RDF
1Rainer Plaga, Dominik Merli A new Definition and Classification of Physical Unclonable Functions. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Apostolos P. Fournaris, Nicolaos Klaoudatos, Nicolas Sklavos 0001, Christos Koulamas Fault and Power Analysis Attack Resistant RNS based Edwards Curve Point Multiplication. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Paulo Martins 0002, Leonel Sousa Stretching the limits of Programmable Embedded Devices for Public-key Cryptography. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Loïc Zussa, Ingrid Exurville, Jean-Max Dutertre, Jean-Baptiste Rigaud, Bruno Robisson, Assia Tria, Jessy Clédière Evidence of an information leakage between logically independent blocks. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Harris E. Michail, Lenos Ioannou, Artemios G. Voyiatzis Pipelined SHA-3 Implementations on FPGA: Architecture and Performance Analysis. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wei He, Alexander Herrmann Placement Security Analysis for Side-Channel Resistant Dual-Rail Scheme in FPGA. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michael Lackner, Reinhard Berlach, Reinhold Weiss, Christian Steger Countering type confusion and buffer overflow attacks on Java smart cards by data type sensitive obfuscation. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Raphael Spreitzer, Jörn-Marc Schmidt Group-signature schemes on constrained devices: the gap between theory and practice. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vishal Saraswat, Daniel Feldman, Denis Foo Kune, Satyajit Das Remote cache-timing attacks against AES. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jens Knoop, Valentina Salapura, Israel Koren, Gerardo Pelosi (eds.) Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014 Search on Bibsonomy CS2@HiPEAC The full citation details ... 2014 DBLP  BibTeX  RDF
1Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Youssef Souissi High-order timing attacks. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Pierre Schnarz, Joachim Wietzke, Ingo Stengel Towards attacks on restricted memory areas through co-processors in embedded multi-OS environments via malicious firmware injection. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Stjepan Picek, Baris Ege, Lejla Batina, Domagoj Jakobovic, Lukasz Chmielewski, Marin Golub On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Robert M. Seepers, Christos Strydis, Ioannis Sourdis, Chris I. De Zeeuw Adaptive entity-identifier generation for IMD emergency access. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kamil Gomina, Philippe Gendrier, Philippe Candelier, Jean-Baptiste Rigaud, Assia Tria Detecting positive voltage attacks on CMOS circuits. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Reinhard Berlach, Michael Lackner, Christian Steger, Johannes Loinig, Ernst Haselsteiner Memory-efficient on-card byte code verification for Java cards. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #45 of 45 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license