The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "COSADE"( http://dblp.L3S.de/Venues/COSADE )

URL (DBLP): http://dblp.uni-trier.de/db/conf/cosade

Publication years (Num. hits)
2012 (19) 2013-2014 (35) 2015 (18) 2016-2017 (31) 2018 (15) 2019 (17) 2020 (15) 2021 (16) 2022-2023 (26) 2024 (15)
Publication types (Num. hits)
inproceedings(194) proceedings(13)
Venues (Conferences, Journals, ...)
COSADE(207)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 207 publication records. Showing 207 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Matthias J. Kannwischer, Aymeric Genêt, Denis Butin, Juliane Krämer, Johannes Buchmann 0001 Differential Power Analysis of XMSS and SPHINCS. Search on Bibsonomy COSADE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Houssem Maghrebi, Emmanuel Prouff On the Use of Independent Component Analysis to Denoise Side-Channel Measurements. Search on Bibsonomy COSADE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Felix Wegener, Amir Moradi 0001 A First-Order SCA Resistant AES Without Fresh Randomness. Search on Bibsonomy COSADE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yann Le Corre, Johann Großschädl, Daniel Dinu Micro-architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors. Search on Bibsonomy COSADE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Joseph Lange, Clément Massart, André Mouraux, François-Xavier Standaert Side-Channel Attacks Against the Human Brain: The PIN Code Case Study. Search on Bibsonomy COSADE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Manami Suzuki, Rei Ueno, Naofumi Homma, Takafumi Aoki Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors. Search on Bibsonomy COSADE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Santos Merino Del Pozo, François-Xavier Standaert Getting the Most Out of Leakage Detection - Statistical Tools and Measurement Setups Hand in Hand. Search on Bibsonomy COSADE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen Does Coupling Affect the Security of Masked Implementations? Search on Bibsonomy COSADE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Oscar M. Guillen, Michael Gruber, Fabrizio De Santis Low-Cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go? Search on Bibsonomy COSADE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel Side-Channel Analysis of Keymill. Search on Bibsonomy COSADE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sylvain Guilley (eds.) Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers Search on Bibsonomy COSADE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA. Search on Bibsonomy COSADE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kashif Nawaz, Dina Kamel, François-Xavier Standaert, Denis Flandre Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks: A Case-Study. Search on Bibsonomy COSADE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Maik Ender, Alexander Wild, Amir Moradi 0001 SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA. Search on Bibsonomy COSADE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Philippe Maurine, Sylvain Guilley Impacts of Technology Trends on Physical Attacks? Search on Bibsonomy COSADE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey DFA on LS-Designs with a Practical Implementation on SCREAM. Search on Bibsonomy COSADE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yoo-Seung Won, Dong-Guk Han Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices. Search on Bibsonomy COSADE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thorben Moos, Amir Moradi 0001 On the Easiness of Turning Higher-Order Leakages into First-Order. Search on Bibsonomy COSADE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kostas Papagiannopoulos, Nikita Veshchikov Mind the Gap: Towards Secure 1st-Order Masking in Software. Search on Bibsonomy COSADE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Liran Lerman, Nikita Veshchikov, Stjepan Picek, Olivier Markowitch On the Construction of Side-Channel Attack Resilient S-boxes. Search on Bibsonomy COSADE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jeremy Dubeuf, David Hély, Vincent Beroulle Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors. Search on Bibsonomy COSADE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rei Ueno, Naofumi Homma, Takafumi Aoki Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation. Search on Bibsonomy COSADE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mehmet Sinan Inci, Berk Gülmezoglu, Thomas Eisenbarth 0001, Berk Sunar Co-location Detection on the Cloud. Search on Bibsonomy COSADE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Amir Moradi 0001, Tobias Schneider 0002 Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series. Search on Bibsonomy COSADE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tobias Schneider 0002, Amir Moradi 0001, Tim Güneysu Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order. Search on Bibsonomy COSADE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Thomas Unterluggauer, Stefan Mangard Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption. Search on Bibsonomy COSADE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alberto Battistello, Christophe Giraud 0001 A Note on the Security of CHES 2014 Symmetric Infective Countermeasure. Search on Bibsonomy COSADE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Arthur Beckers, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede Design and Implementation of a Waveform-Matching Based Triggering System. Search on Bibsonomy COSADE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ágnes Kiss, Juliane Krämer, Pablo Rauzy, Jean-Pierre Seifert Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT. Search on Bibsonomy COSADE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Toru Akishita, Noboru Kunihiro Improved Differential Fault Analysis on Camellia-128. Search on Bibsonomy COSADE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Elad Carmon, Jean-Pierre Seifert, Avishai Wool Simple Photonic Emission Attack with Reduced Data Complexity. Search on Bibsonomy COSADE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1A. Adam Ding, Cong Chen, Thomas Eisenbarth 0001 Simpler, Faster, and More Robust T-Test Based Leakage Detection. Search on Bibsonomy COSADE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger, Sylvain Guilley Dismantling Real-World ECC with Horizontal and Vertical Template Attacks. Search on Bibsonomy COSADE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Colin O'Flynn, Zhizhang Chen Power Analysis Attacks Against IEEE 802.15.4 Nodes. Search on Bibsonomy COSADE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1François-Xavier Standaert, Elisabeth Oswald (eds.) Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers Search on Bibsonomy COSADE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Billy Bob Brumley Faster Software for Fast Endomorphisms. Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon, Jean-Baptiste Mairy, Yves Deville Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits. Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Praveen Kumar Vadnala, Johann Großschädl Faster Mask Conversion with Lookup Tables. Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Amir Moradi 0001, Gesine Hinterwälder Side-Channel Security Analysis of Ultra-Low-Power FRAM-Based MCUs. Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers. Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michael Muehlberghuber, Thomas Korak, Philipp Dunst, Michael Hutter Towards Evaluating DPA Countermeasures for Keccak K1012ECCAK on a Real ASIC. Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gabriel Goller, Georg Sigl Side Channel Attacks on Smartphones and Embedded Devices Using Standard Radio Equipment. Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Takeshi Sugawara 0001, Daisuke Suzuki, Minoru Saeki Two Operands of Multipliers in Side-Channel Attack. Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pascal Sasdrich, Oliver Mischke, Amir Moradi 0001, Tim Güneysu Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives. Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks. Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stefan Mangard, Axel Y. Poschmann (eds.) Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Robert Specht, Johann Heyszl, Martin Kleinsteuber, Georg Sigl Improving Non-profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-channel High-Resolution EM Measurements. Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stjepan Picek, Lejla Batina, Pieter Buzing, Domagoj Jakobovic Fault Injection with a New Flavor: Memetic Algorithms Make a Difference. Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Liran Lerman, Romain Poussier, Gianluca Bontempi, Olivier Markowitch, François-Xavier Standaert Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis). Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alexander Wild, Amir Moradi 0001, Tim Güneysu Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs. Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sikhar Patranabis, Abhishek Chakraborty 0001, Phuong Ha Nguyen, Debdeep Mukhopadhyay A Biased Fault Attack on the Time Redundancy Countermeasure for AES. Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Berk Gülmezoglu, Mehmet Sinan Inci, Gorka Irazoqui Apecechea, Thomas Eisenbarth 0001, Berk Sunar A Faster and More Realistic Flush+Reload Attack on AES. Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mariya Georgieva, Frédéric de Portzamparc Toward Secure Implementation of McEliece Decryption. Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Annelie Heuser, Olivier Rioul, Sylvain Guilley A Theoretical Study of Kolmogorov-Smirnov Distinguishers - Side-Channel Analysis vs. Differential Cryptanalysis. Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Suvadeep Hajra, Debdeep Mukhopadhyay On the Optimal Pre-processing for Non-profiling Differential Power Analysis. Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ludovic-Henri Gustin, François Durvaux, Stéphanie Kerckhof, François-Xavier Standaert, Michel Verleysen Support Vector Machines for Improved IP Detection with Soft Physical Hash Functions. Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Guilherme Perin, Laurent Imbert, Lionel Torres, Philippe Maurine Attacking Randomized Exponentiations Using Unsupervised Learning. Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede Generic DPA Attacks: Curse or Blessing? Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohamed Karroumi, Benjamin Richard, Marc Joye Addition with Blinded Operands. Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Colin O'Flynn, Zhizhang (David) Chen ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research. Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christophe Giraud 0001 On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance. Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Omar Choudary 0001, Markus G. Kuhn Template Attacks on Different Devices. Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yanis Linge, Cécile Dumas, Sophie Lambert-Lacroix Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis. Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede A Note on the Use of Margins to Compare Distinguishers. Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sebastian Kutzner, Axel Poschmann On the Security of RSM - Presenting 5 First- and Second-Order Attacks. Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mehari Msgna, Konstantinos Markantonakis, David Naccache, Keith Mayes Verifying Software Integrity in Embedded Systems: A Side Channel Approach. Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sho Endo, Naofumi Homma, Yu-ichi Hayashi, Junko Takahashi, Hitoshi Fuji, Takafumi Aoki A Multiple-Fault Injection Attack by Adaptive Timing Control Under Black-Box Conditions and a Countermeasure. Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alberto Battistello Common Points on Elliptic Curves: The Achilles' Heel of Fault Attack Countermeasures. Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Emmanuel Prouff (eds.) Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Valentina Banciu, Elisabeth Oswald Pragmatism vs. Elegance: Comparing Two Approaches to Simple Power Attacks on AES. Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mathieu Carbone, Sébastien Tiran, Sébastien Ordas, Michel Agoyan, Yannick Teglia, Gilles R. Ducharme, Philippe Maurine On Adaptive Bandwidth Selection for Efficient MIA. Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Gilles Piret Collision-Correlation Attack Against a First-Order Masking Scheme for MAC Based on SHA-3. Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Franck Courbon, Philippe Loubet-Moundi, Jacques J. A. Fournier, Assia Tria Adjusting Laser Injections for Fully Controlled Faults. Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Maël Berthier, Yves Bocktaels, Julien Bringer, Hervé Chabanne, Taoufik Chouta, Jean-Luc Danger, Mélanie Favre, Tarik Graba Studying Leakages on an Embedded Biometric System Using Side Channel Analysis. Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Juliane Krämer, Dmitry Nedospasov, Alexander Schlösser, Jean-Pierre Seifert Differential Photonic Emission Analysis. Search on Bibsonomy COSADE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christophe Clavier, Benoit Feix Updated Recommendations for Blinded Exponentiation vs. Single Trace Analysis. Search on Bibsonomy COSADE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Amine Dehbaoui, Amir-Pasha Mirbaha, Nicolas Moro, Jean-Max Dutertre, Assia Tria Electromagnetic Glitch on the AES Round Counter. Search on Bibsonomy COSADE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Johannes Blömer, Peter Günther 0001, Gennadij Liske Improved Side Channel Attacks on Pairing Based Cryptography. Search on Bibsonomy COSADE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yang Li 0001, Sho Endo, Nicolas Debande, Naofumi Homma, Takafumi Aoki, Thanh-Ha Le, Jean-Luc Danger, Kazuo Ohta, Kazuo Sakiyama Exploring the Relations between Fault Sensitivity and Power Consumption. Search on Bibsonomy COSADE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, Huaxiong Wang On 3-Share Threshold Implementations for 4-Bit S-boxes. Search on Bibsonomy COSADE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Thomas Roche, Victor Lomné Collision-Correlation Attack against Some 1st-Order Boolean Masking Schemes in the Context of Secure Devices. Search on Bibsonomy COSADE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Fan Zhang 0010, Xinjie Zhao 0001, Shize Guo, Tao Wang 0008, Zhijie Shi Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers. Search on Bibsonomy COSADE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Emmanuel Prouff (eds.) Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers Search on Bibsonomy COSADE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Liran Lerman, Stephane Fernandes Medeiros, Nikita Veshchikov, Cédric Meuter, Gianluca Bontempi, Olivier Markowitch Semi-Supervised Template Attack. Search on Bibsonomy COSADE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Diana Maimut, Cédric Murdica, David Naccache, Mehdi Tibouchi Fault Attacks on Projective-to-Affine Coordinates Conversion. Search on Bibsonomy COSADE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Takafumi Hibiki, Naofumi Homma, Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Takafumi Aoki Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure. Search on Bibsonomy COSADE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Raphael Spreitzer, Thomas Plos Cache-Access Pattern Attack on Disaligned AES T-Tables. Search on Bibsonomy COSADE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Benoit Feix, Alexandre Venelli Defeating with Fault Injection a Combined Attack Resistant Exponentiation. Search on Bibsonomy COSADE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alexander Krüger The Schindler-Itoh-attack in Case of Partial Information Leakage. Search on Bibsonomy COSADE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mathias Wagner 700+ Attacks Published on Smart Cards: The Need for a Systematic Counter Strategy. Search on Bibsonomy COSADE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Philipp Jovanovic, Martin Kreuzer, Ilia Polian A Fault Attack on the LED Block Cipher. Search on Bibsonomy COSADE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Annelie Heuser, Michael Zohner Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines. Search on Bibsonomy COSADE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Wei He 0015, Eduardo de la Torre, Teresa Riesgo An Interleaved EPE-Immune PA-DPL Structure for Resisting Concentrated EM Side Channel Attacks on FPGA Implementation. Search on Bibsonomy COSADE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Cédric Murdica, Sylvain Guilley, Jean-Luc Danger, Philippe Hoogvorst, David Naccache Same Values Power Analysis Using Special Points on Elliptic Curves. Search on Bibsonomy COSADE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Viktor Fischer A Closer Look at Security in Random Number Generators Design. Search on Bibsonomy COSADE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michael Zohner, Michael Kasper, Marc Stöttinger Butterfly-Attack on Skein's Modular Addition. Search on Bibsonomy COSADE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron, Christophe Giraud 0001, Emmanuel Prouff, Soline Renner, Matthieu Rivain, Praveen Kumar Vadnala Conversion of Security Proofs from One Leakage Model to Another: A New Issue. Search on Bibsonomy COSADE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xin-jie Zhao 0001, Fan Zhang 0010, Shize Guo, Tao Wang 0008, Zhijie Shi, Huiying Liu, Keke Ji MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation. Search on Bibsonomy COSADE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Camille Vuillaume, Takashi Endo, Paul Wooderson RSA Key Generation: New Attacks. Search on Bibsonomy COSADE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Thomas Korak, Thomas Plos, Michael Hutter Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario. Search on Bibsonomy COSADE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 207 (100 per page; Change: )
Pages: [<<][1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license