The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SPACE"( http://dblp.L3S.de/Venues/SPACE )

URL (DBLP): http://dblp.uni-trier.de/db/conf/space

Publication years (Num. hits)
2012-2013 (25) 2014 (22) 2015 (22) 2016 (25) 2017 (17) 2018-2019 (29) 2020-2021 (27) 2022 (20) 2023-2024 (15)
Publication types (Num. hits)
inproceedings(190) proceedings(12)
Venues (Conferences, Journals, ...)
SPACE(202)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 202 publication records. Showing 202 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay Tackling the Time-Defence: An Instruction Count Based Micro-architectural Side-Channel Attack on Block Ciphers. Search on Bibsonomy SPACE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Donghoon Chang, Mohona Ghosh, Arpan Jati, Abhishek Kumar 0002, Somitra Kumar Sanadhya eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices. Search on Bibsonomy SPACE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kamalkumar R. Macwan, Sankita J. Patel Mutual Friend Attack Prevention in Social Network Data Publishing. Search on Bibsonomy SPACE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Akhilesh Siddhanti, Santanu Sarkar 0001, Subhamoy Maitra, Anupam Chattopadhyay Differential Fault Attack on Grain v1, ACORN v3 and Lizard. Search on Bibsonomy SPACE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Efthimios Alepis, Constantinos Patsakis Hey Doc, Is This Normal?: Exploring Android Permissions in the Post Marshmallow Era. Search on Bibsonomy SPACE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vishal Saraswat, Rajeev Anand Sahu Short Integrated PKE+PEKS in Standard Model. Search on Bibsonomy SPACE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sashank Dara, V. N. Muralidhara Similarity Based Interactive Private Information Retrieval. Search on Bibsonomy SPACE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bhagwan N. Bathe, Bharti Hariramani, A. K. Bhattacharjee, S. V. Kulgod Analysis of Diagonal Constants in Salsa. Search on Bibsonomy SPACE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peter Schwabe, Bas Westerbaan Solving Binary MQ with Grover's Algorithm. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1François-Xavier Standaert Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices - Overview of the ERC Project CRASH, Part I (Invited Talk). Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Naghmeh Karimi, Jean-Luc Danger, Florent Lozach, Sylvain Guilley Predictive Aging of Reliability of Two Delay PUFs. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joan Daemen Spectral Characterization of Iterating Lossy Mappings. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jian Liu 0004, Sihem Mesnager, Lusheng Chen Partially Homomorphic Encryption Schemes over Finite Fields. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wei He, Jakub Breier, Shivam Bhasin, Dirmanto Jap, Hock Guan Ong, Chee Lip Gan Comprehensive Laser Sensitivity Profiling and Data Register Bit-Flips for Cryptographic Fault Attacks in 65 Nm FPGA. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Pedro Maat C. Massolino, Joost Renes, Lejla Batina Implementing Complete Formulas on Weierstrass Curves in Hardware. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ajay Kumara M. A., Jaidhar C. D. VMI Based Automated Real-Time Malware Detector for Virtualized Cloud Environment. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Debapriya Basu Roy, Avik Chakraborti, Donghoon Chang, S. V. Dilip Kumar, Debdeep Mukhopadhyay, Mridul Nandi Fault Based Almost Universal Forgeries on CLOC and SILC. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai, Jothi Rangasamy Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study Using PRINCE. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Payingat Jilna, P. P. Deepthi Light Weight Key Establishment Scheme for Wireless Sensor Networks. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Houssem Maghrebi, Thibault Portigliatti, Emmanuel Prouff Breaking Cryptographic Implementations Using Deep Learning Techniques. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Amine Mrabet, Nadia El Mrabet, Ronan Lashermes, Jean-Baptiste Rigaud, Belgacem Bouallegue, Sihem Mesnager, Mohsen Machhout A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Guido Bertoni, Marco Martinoli A Methodology for the Characterisation of Leakages in Combinatorial Logic. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shivam Bhasin, Debdeep Mukhopadhyay Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms - A Tutorial. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Erdem Alkim, Philipp Jakubeit, Peter Schwabe NewHope on ARM Cortex-M. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sujoy Sinha Roy, Angshuman Karmakar, Ingrid Verbauwhede Ring-LWE: Applications to Cryptography and Their Efficient Realization. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Donghoon Chang, Amit Kumar Chauhan, Naina Gupta 0001, Arpan Jati, Somitra Kumar Sanadhya Exploiting the Leakage: Analysis of Some Authenticated Encryption Schemes. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dhiman Saha, Sourya Kakarla, Srinath Mandava, Dipanwita Roy Chowdhury Gain: Practical Key-Recovery Attacks on Round-reduced PAEQ. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dina Kamel, Guerric de Streel, Santos Merino Del Pozo, Kashif Nawaz, François-Xavier Standaert, Denis Flandre, David Bol Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jeffrey Burdges, Florian Dold, Christian Grothoff, Marcello Stanisci Enabling Secure Web Payments with GNU Taler. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wei He, Jakub Breier, Shivam Bhasin Cheap and Cheerful: A Low-Cost Digital Sensor for Detecting Laser Fault Injection Attacks. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sanchit Gupta, Harshit Sharma, Sarvjeet Kaur Malware Characterization Using Windows API Call Sequences. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Stephane Fernandes Medeiros, François Gérard, Nikita Veshchikov, Liran Lerman, Olivier Markowitch Breaking Kalyna 128/128 with Power Attacks. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Claude Carlet, M. Anwar Hasan, Vishal Saraswat (eds.) Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Avik Dayal, Yi Deng 0005, Sandeep K. Shukla Design of Cyber Security for Critical Infrastructures: A Case for a Schizoid Design Approach. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay, Xuan Thuy Ngo, Zakaria Najm Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini Almost Optimum Secret Sharing with Cheating Detection. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lukasz Krzywiecki, Malgorzata Sulkowska, Filip Zagórski Hierarchical Ring Signatures Revisited - Unconditionally and Perfectly Anonymous Schnorr Version. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Vit Bukac, Vashek Matyas Analyzing Traffic Features of Common Standalone DoS Attack Tools. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Claude Carlet S-boxes, Boolean Functions and Codes for the Resistance of Block Ciphers to Cryptographic Attacks, with or without Side Channels. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Subhadeep Banik, Sonu Jha How Not to Combine RC4 States. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Brinda Hampiholi, Gergely Alpár, Fabian van den Broek, Bart Jacobs 0001 Towards Practical Attribute-Based Signatures. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohamed Tolba, Ahmed Abdelkhalek 0001, Amr M. Youssef Meet-in-the-Middle Attacks on Round-Reduced Khudra. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini Compact Accumulator Using Lattices. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Riham AlTawy, Amr M. Youssef Preimage Analysis of the Maelstrom-0 Hash Function. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sikhar Patranabis, Abhishek Chakraborty 0001, Debdeep Mukhopadhyay Fault Tolerant Infective Countermeasure for AES. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Guido Marco Bertoni, Lorenzo Grassi 0001, Filippo Melzani Simulations of Optical Emissions for Attacking AES and Masked AES. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rajat Subhra Chakraborty, Peter Schwabe, Jon A. Solworth (eds.) Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stjepan Picek, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Lejla Batina Modified Transparency Order Property: Solution or Just Another Attempt. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ahmed Abdelkhalek 0001, Mohamed Tolba, Amr M. Youssef Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Erick Nascimento, Julio César López-Hernández, Ricardo Dahab Efficient and Secure Elliptic Curve Cryptography for 8-bit AVR Microcontrollers. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Leo St. Amour, W. Michael Petullo Improving Application Security through TLS-Library Redesign. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Trent Jaeger, Xinyang Ge, Divya Muthukumaran, Sandra Julieta Rueda, Joshua Schiffman, Hayawardh Vijayakumar Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dan Cvrcek, Petr Svenda Architecture Considerations for Massively Parallel Hardware Security Platform - Building a Workhorse for Cryptography as a Service. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pol Van Aubel, Daniel J. Bernstein, Ruben Niederhagen Investigating SRAM PUFs in large CPUs and GPUs. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sanjit Chatterjee, Sayantan Mukherjee, Govind Patidar Efficient Protocol for Authenticated Email Search. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sashank Dara, Scott R. Fluhrer FNR: Arbitrary Length Small Domain Block Cipher Proposal. Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm Analysis and Improvements of the DPA Contest v4 Implementation. Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sukhendu Kuila, Dhiman Saha, Madhumangal Pal, Dipanwita Roy Chowdhury CASH: Cellular Automata Based Parameterized Hash. Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Souvik Kolay, Debdeep Mukhopadhyay Khudra: A New Lightweight Block Cipher for FPGAs. Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Andreas Enge, Jérôme Milan Implementing Cryptographic Pairings at Standard Security Levels. Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jungmin Park, Akhilesh Tyagi t-Private Systems: Unified Private Memories and Computation. Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sabyasachi Karati, Abhijit Das 0004 Batch Verification of EdDSA Signatures. Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Partha Sarathi Roy 0001, Avishek Adhikari, Rui Xu 0006, Kirill Morozov, Kouichi Sakurai An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency. Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dillibabu Shanmugam, Ravikumar Selvam, Suganya Annadurai Differential Power Analysis Attack on SIMON and LED Block Ciphers. Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kunwar Singh, C. Pandu Rangan, A. K. Banerjee Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme. Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1A. M. Aswini, P. Vinod 0001 Android Malware Analysis Using Ensemble Features. Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1K. A. Asmitha, P. Vinod 0001 Linux Malware Detection Using eXtended-Symmetric Uncertainty. Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Marek Sýs, Zdenek Ríha Faster Randomness Testing with the NIST Statistical Test Suite. Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Raghuvir Songhela, Manik Lal Das Yet Another Strong Privacy-Preserving RFID Mutual Authentication Protocol. Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rajat Subhra Chakraborty, Vashek Matyas, Patrick Schaumont (eds.) Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sabyasachi Karati, Abhijit Das 0004, Dipanwita Roy Chowdhury Randomized Batch Verification of Standard ECDSA Signatures. Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Yannick Teglia Boosting Higher-Order Correlation Attacks by Dimensionality Reduction. Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Radim Ostádal, Petr Svenda, Václav Matyás A New Approach to Secrecy Amplification in Partially Compromised Networks (Invited Paper). Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Abhrajit Sengupta, Dhiman Saha, Shamit Ghosh, Deval Mehta, Dipanwita Roy Chowdhury AEC: A Practical Scheme for Authentication with Error Correction. Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Abhishek Chakraborty 0001, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay Fibonacci LFSR vs. Galois LFSR: Which is More Vulnerable to Power Attacks? Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Subhabrata Samajder, Palash Sarkar 0001 Some Randomness Experiments on TRIVIUM. Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Phuong Ha Nguyen, Durga Prasad Sahoo Lightweight and Secure PUFs: A Survey (Invited Paper). Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sanjit Chatterjee, Chethan Kamath From Selective-ID to Full-ID IBS without Random Oracles. Search on Bibsonomy SPACE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Patrick Schaumont, Aydin Aysu Three Design Dimensions of Secure Embedded Systems. Search on Bibsonomy SPACE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Praveen Kumar Vadnala, Johann Großschädl Algorithms for Switching between Boolean and Arithmetic Masking of Second Order. Search on Bibsonomy SPACE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Prateek Barapatre, Chandrasekaran Pandu Rangan Anonymous Identity-Based Identification Scheme in Ad-Hoc Groups without Pairings. Search on Bibsonomy SPACE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Pratik Kumar, Nagendra Chowdary, Anish Mathuria Alphanumeric Shellcode Generator for ARM Architecture. Search on Bibsonomy SPACE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Manik Lal Das Strong Security and Privacy of RFID System for Internet of Things Infrastructure. Search on Bibsonomy SPACE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Prateek Barapatre, Chandrasekaran Pandu Rangan Identity-Based Identification Schemes from ID-KEMs. Search on Bibsonomy SPACE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Benedikt Gierlichs, Sylvain Guilley, Debdeep Mukhopadhyay (eds.) Security, Privacy, and Applied Cryptography Engineering - Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings Search on Bibsonomy SPACE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nektarios Georgios Tsoutsos, Michail Maniatakos Investigating the Application of One Instruction Set Computing for Encrypted Data Computation. Search on Bibsonomy SPACE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Liran Lerman, Gianluca Bontempi, Souhaib Ben Taieb, Olivier Markowitch A Time Series Approach for Profiling Attack. Search on Bibsonomy SPACE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Syed Taqi Ali, B. B. Amberker Dynamic Attribute Based Group Signature with Attribute Anonymity and Tracing in the Standard Model. Search on Bibsonomy SPACE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Binanda Sengupta, Abhijit Das 0004 SIMD-Based Implementations of Sieving in Integer-Factoring Algorithms. Search on Bibsonomy SPACE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Claude Carlet Correlation-Immune Boolean Functions for Leakage Squeezing and Rotating S-Box Masking against Side Channel Attacks. Search on Bibsonomy SPACE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sumit Kumar Pandey, Santanu Sarkar 0001, Mahabir Prasad Jhanwar Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack. Search on Bibsonomy SPACE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Andreas Gornik, Ivan Stoychev, Jürgen Oehm A Novel Circuit Design Methodology to Reduce Side Channel Leakage. Search on Bibsonomy SPACE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vincent Immler Breaking Hitag 2 Revisited. Search on Bibsonomy SPACE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kunwar Singh, C. Pandu Rangan, A. K. Banerjee Adaptively Secure Efficient Lattice (H)IBE in Standard Model with Short Public Parameters. Search on Bibsonomy SPACE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dai Yamamoto, Gabriel Hospodar, Roel Maes, Ingrid Verbauwhede Performance and Security Evaluation of AES S-Box-Based Glitch PUFs on FPGAs. Search on Bibsonomy SPACE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar 0001 Some Results on Related Key-IV Pairs of Grain. Search on Bibsonomy SPACE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Santanu Sarkar 0001 Reduction in Lossiness of RSA Trapdoor Permutation. Search on Bibsonomy SPACE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Goutam Paul 0001, Shashwat Raizada Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers. Search on Bibsonomy SPACE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Anshu Yadav, Anish Mathuria Towards Formal Analysis of Key Control in Group Key Agreement Protocols. Search on Bibsonomy SPACE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Stephane Fernandes Medeiros The Schedulability of AES as a Countermeasure against Side Channel Attacks. Search on Bibsonomy SPACE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 202 (100 per page; Change: )
Pages: [<<][1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license