The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "PROOFS"( http://dblp.L3S.de/Venues/PROOFS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ches

Publication years (Num. hits)
2017 (6) 2018 (6) 2019 (6)
Publication types (Num. hits)
inproceedings(15) proceedings(3)
Venues (Conferences, Journals, ...)
PROOFS(18)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 18 publication records. Showing 18 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Karine Heydemann, Ulrich Kühne, Letitia Li (eds.) Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, PROOFS 2019, colocated with CHES 2018, Atlanta, GA, USA, August 24, 2019 Search on Bibsonomy PROOFS The full citation details ... 2019 DBLP  BibTeX  RDF
1Wei Cheng 0003, Claude Carlet, Kouassi Goli, Jean-Luc Danger, Sylvain Guilley Detecting Faults in Inner-Product Masking Scheme - IPM-FD: IPM with Fault Detection. Search on Bibsonomy PROOFS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark M. Tehranipoor Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones. Search on Bibsonomy PROOFS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Rei Ueno, Junko Takahashi, Yu-ichi Hayashi, Naofumi Homma Constructing Sliding Windows Leak from Noisy Cache Timing Information of OSS-RSA. Search on Bibsonomy PROOFS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Osnat Keren, Ilia Polian A comment on information leakage from robust code-based checkers detecting fault attacks on cryptographic primitives. Search on Bibsonomy PROOFS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sébastien Carré, Victor Dyseryn, Adrien Facon, Sylvain Guilley, Thomas Perianin End-to-end automated cache-timing attack driven by Machine Learning. Search on Bibsonomy PROOFS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki A Non-Reversible Insertion Method for Hardware Trojans Based on Path Delay Faults. Search on Bibsonomy PROOFS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Muhammad Ali Siddiqi, Robert M. Seepers, Mohammad Hamad, Vassilis Prevelakis, Christos Strydis Attack-tree-based Threat Modeling of Medical Implants. Search on Bibsonomy PROOFS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Danilo Sijacic, Josep Balasch, Bohan Yang 0001, Santosh Ghosh, Ingrid Verbauwhede Towards Efficient and Automated Side Channel Evaluations at Design Time. Search on Bibsonomy PROOFS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Manaar Alam, Debdeep Mukhopadhyay, Sai Praveen Kadiyala, Siew Kei Lam, Thambipillai Srikanthan Side-Channel Assisted Malware Classifier with Gradient Descent Correction for Embedded Platforms. Search on Bibsonomy PROOFS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Ulrich Kühne, Nele Mentens (eds.) PROOFS 2018, 7th International Workshop on Security Proofs for Embedded Systems, colocated with CHES 2018, Amsterdam, The Netherlands, September 13, 2018 Search on Bibsonomy PROOFS The full citation details ... 2018 DBLP  BibTeX  RDF
1Batya Karp, Maël Gay, Osnat Keren, Ilia Polian Detection and Correction of Malicious and Natural Faults in Cryptographic Modules. Search on Bibsonomy PROOFS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, Pallab Dasgupta An Automated Framework for Exploitable Fault Identification in Block Ciphers - A Data Mining Approach. Search on Bibsonomy PROOFS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ulrich Kühne, Jean-Luc Danger, Sylvain Guilley (eds.) PROOFS 2017, 6th International Workshop on Security Proofs for Embedded Systems, Taipei, Taiwan, September 29th, 2017 Search on Bibsonomy PROOFS The full citation details ... 2017 DBLP  BibTeX  RDF
1Poulami Das 0003, Debapriya Basu Roy, Debdeep Mukhopadhyay Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands. Search on Bibsonomy PROOFS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nils Wisiol, Christoph Graebnitz, Marian Margraf, Manuel Oswald, Tudor A. A. Soroceanu, Benjamin Zengin Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs. Search on Bibsonomy PROOFS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christoph Baumann, Oliver Schwarz, Mads Dam Compositional Verification of Security Properties for Embedded Execution Platforms. Search on Bibsonomy PROOFS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Inès Ben El Ouahma, Quentin L. Meunier, Karine Heydemann, Emmanuelle Encrenaz Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes. Search on Bibsonomy PROOFS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #18 of 18 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license