The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CHES"( http://dblp.L3S.de/Venues/CHES )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ches

Publication years (Num. hits)
1999 (30) 2000 (28) 2001 (34) 2002 (43) 2003 (35) 2004 (33) 2005 (33) 2006 (36) 2007 (32) 2008 (30) 2009 (33) 2010 (31) 2011 (34) 2012 (33) 2013 (28) 2014 (34) 2015 (35) 2016 (31) 2017 (34)
Publication types (Num. hits)
inproceedings(608) proceedings(19)
Venues (Conferences, Journals, ...)
CHES(627)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 666 occurrences of 255 keywords

Results
Found 627 publication records. Showing 627 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Meng-Day (Mandel) Yu, David M'Raïhi, Richard Sowell, Srinivas Devadas Lightweight and Secure PUF Key Storage Using Limits of Machine Learning. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mehrdad Majzoobi, Farinaz Koushanfar, Srinivas Devadas FPGA-Based True Random Number Generation Using Circuit Metastability with Adaptive Feedback Control. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Philipp Grabher, Johann Großschädl, Simon Hoerder, Kimmo Järvinen 0001, Dan Page, Stefan Tillich, Marcin Wójcik An Exploration of Mechanisms for Dynamic Cryptographic Instruction Set Extension. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ray C. C. Cheung, Sylvain Duquesne, Junfeng Fan, Nicolas Guillermin, Ingrid Verbauwhede, Gavin Xiaoxu Yao FPGA Implementation of Pairings Using Residue Number System and Lazy Reduction. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jonathan Taverne, Armando Faz-Hernández, Diego F. Aranha, Francisco Rodríguez-Henríquez, Darrel Hankerson, Julio César López-Hernández Software Implementation of Binary Elliptic Curves: Impact of the Carry-Less Multiplier on Scalar Multiplication. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1HeeSeok Kim, Seokhie Hong, Jongin Lim 0001 A Fast and Provably Secure Higher-Order Masking of AES S-Box. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Po-Chun Kuo, Michael Schneider 0002, Özgür Dagdelen, Jan Reichelt, Johannes Buchmann 0001, Chen-Mou Cheng, Bo-Yin Yang Extreme Enumeration on GPU and in Clouds - - How Many Dollars You Need to Break SVP Challenges -. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael Schneider 0002, Norman Göttert Random Sampling for Short Lattice Vectors on Graphics Cards. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein, Niels Duif, Tanja Lange 0001, Peter Schwabe, Bo-Yin Yang High-Speed High-Security Signatures. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tetsuya Tominaga Standardization Works for Security Regarding the Electromagnetic Environment. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kyoji Shibutani, Takanori Isobe 0001, Harunaga Hiwatari, Atsushi Mitsuda, Toru Akishita, Taizo Shirai Piccolo: An Ultra-Lightweight Blockcipher. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Louis Goubin, Ange Martinelli Protecting AES with Shamir's Secret Sharing Scheme. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Joppe W. Bos, Onur Özen, Martijn Stam Efficient Hashing Using the AES Instruction Set. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi Tibouchi Modulus Fault Attacks against RSA-CRT Signatures. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mathieu Renauld, Dina Kamel, François-Xavier Standaert, Denis Flandre Information Theoretic and Security Analysis of a 65-Nanometer DDSLL AES S-Box. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1David F. Oswald, Christof Paar Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jian Guo 0001, Thomas Peyrin, Axel Poschmann, Matthew J. B. Robshaw The LED Block Cipher. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Junfeng Fan, Benedikt Gierlichs, Frederik Vercauteren To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Santosh Ghosh, Dipanwita Roy Chowdhury, Abhijit Das 0004 High Speed Cryptoprocessor for η T Pairing on 128-bit Secure Supersingular Elliptic Curves over Characteristic Two Fields. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Amir Moradi 0001, Oliver Mischke, Christof Paar, Yang Li 0001, Kazuo Ohta, Kazuo Sakiyama On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede spongent: A Lightweight Hash Function. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tim Güneysu, Amir Moradi 0001 Generic Side-Channel Countermeasures for Reconfigurable Devices. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Emmanuel Prouff, Thomas Roche Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Albrecht Petzoldt, Enrico Thomae, Stanislav Bulygin, Christopher Wolf Small Public Keys and Fast Verification for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic Public Key Systems. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil Improved Collision-Correlation Power Analysis on First Order Protected AES. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ekawat Homsirikamol, Marcin Rogawski, Kris Gaj Throughput vs. Area Trade-offs in High-Speed Architectures of Five Round 3 SHA-3 Candidates Implemented Using Xilinx and Altera FPGAs. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael Hutter, Erich Wenger Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Aswin Raghav Krishna, Seetharam Narasimhan, Xinmu Wang, Swarup Bhunia MECCA: A Robust Low-Overhead PUF Using Embedded Memory Array. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Takao Ochiai, Masahiko Takenaka, Kouichi Itoh Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael Tunstall, Marc Joye Coordinate Blinding over Large Prime Fields. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sergei Skorobogatov Flash Memory 'Bumping' Attacks. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Michal Varchola, Milos Drutarovský New High Entropy Element for FPGA Based True Random Number Generators. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Maximilian Hofer, Christoph Böhm 0003 An Alternative to Error Correction for SRAM-Like PUFs. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yasuyuki Nogami, Kenta Nekado, Tetsumi Toyota, Naoto Hongo, Yoshitaka Morikawa Mixed Bases for Efficient Inversion in \mathbb F((22)2) and Conversion Matrices of SubBytes of AES. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nicolas Guillermin A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over \mathbbFp\mathbb{F}_p. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang Fast Exhaustive Search for Polynomial Systems in F2. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Daisuke Suzuki, Koichi Shimizu The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia Quark: A Lightweight Hash. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche Sponge-Based Pseudo-Random Number Generators. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jerome Di-Battista, Jean-Christophe Courrège, Bruno Rouzeyre, Lionel Torres, Philippe Perdu When Failure Analysis Meets Side-Channel Attacks. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Matthieu Rivain, Emmanuel Prouff Provably Secure Higher-Order Masking of AES. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Christian Wenzel-Benner, Jens Gräf XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking Framework. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Patrick Longa, Catherine H. Gebotys Efficient Techniques for High-Speed Elliptic Curve Cryptography. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Onur Aciiçmez, Billy Bob Brumley, Philipp Grabher New Results on Instruction Cache Attacks. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Joppe W. Bos, Deian Stefan Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin Public Key Perturbation of Randomized RSA Implementations. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yang Li 0001, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, Kazuo Ohta Fault Sensitivity Analysis. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yossef Oren, Mario Kirschbaum, Thomas Popp, Avishai Wool Algebraic Side-Channel Analysis in the Presence of Errors. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Axel Poschmann, San Ling, Huaxiong Wang 256 Bit Standardized Crypto for 650 GE - GOST Revisited. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kimmo Järvinen 0001, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider 0003 Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version). Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lars R. Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw PRINTcipher: A Block Cipher for IC-Printing. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Olivier Benoît, Thomas Peyrin Side-Channel Analysis of Six SHA-3 Candidates. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Stéphane Badel, Nilay Dagtekin, Jorge Nakahara Jr., Khaled Ouafi, Nicolas Reffé, Pouyan Sepehrdad, Petr Susil, Serge Vaudenay ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron, Ilya Kizhvatov Analysis and Improvement of the Random Delay Countermeasure of CHES 2009. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Amir Moradi 0001, Oliver Mischke, Thomas Eisenbarth 0001 Correlation-Enhanced Power Analysis Collision Attack. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Stefan Mangard, François-Xavier Standaert (eds.) Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Raveen R. Goundar, Marc Joye, Atsuko Miyaji Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves - (Extended Abstract). Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dongdong Du, Seetharam Narasimhan, Rajat Subhra Chakraborty, Swarup Bhunia Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Luca Henzen, Pietro Gendotti, Patrice Guillet, Enrico Pargaetzi, Martin Zoller, Frank K. Gürkaynak Developing a Hardware Evaluation Method for SHA-3 Candidates. Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xu Guo 0001, Junfeng Fan, Patrick Schaumont, Ingrid Verbauwhede Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier Fault Attacks on RSA Signatures with Partially Unknown Messages. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Coppersmith’s theorem, iso/iec 9796-2, digital signatures, rsa, Fault attacks
1Thomas Eisenbarth 0001, Tim Güneysu, Stefan Heyse, Christof Paar MicroEliece: McEliece for Embedded Devices. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nicolas Veyrat-Charvillon, François-Xavier Standaert Mutual Information Analysis: How, When and Why?. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Christophe De Cannière, Orr Dunkelman, Miroslav Knezevic KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust Differential Cluster Analysis. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Differential Cluster Analysis, AES Hardware, Differential Power Analysis, Collision Attacks, Side-channel Cryptanalysis
1Mike Hamburg Accelerating AES with Vector Permute Instructions. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SSSE3, vector permute, cache-timing attacks, AES, fast implementations, composite fields, AltiVec
1Matthieu Rivain, Emmanuel Prouff, Julien Doget Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Lang Lin, Markus Kasper, Tim Güneysu, Christof Paar, Wayne P. Burleson Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Trojan Hardware, Trojan Side-Channel, Hardware Trojan Detection, Covert Channel, Side-Channel Analysis
1Thomas Finke, Max Gebhardt, Werner Schindler A New Side-Channel Attack on RSA Prime Generation. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RSA prime generation, Side-channel attack, key generation
1Minoru Saeki, Daisuke Suzuki, Koichi Shimizu, Akashi Satoh A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Karatsuba-Ofman multiplier, FPGA, elliptic curve, hardware accelerator, Tate pairing, finite field arithmetic, ? T pairing
1Jean-Sébastien Coron, Ilya Kizhvatov An Efficient Method for Random Delay Generation in Embedded Software. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF random delays, Side channel attacks, countermeasures
1Roel Maes, Pim Tuyls, Ingrid Verbauwhede Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Helper Data Algorithm, Toeplitz Hash, FPGA Implementation, Physically Unclonable Functions, Soft-Decision Decoder
1Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo, Frost Yu-Shuang Lee, Bo-Yin Yang SSE Implementation of Multivariate PKCs on Modern x86 CPUs. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multivariate public key cryptosystem (MPKC), ?IC, vector instructions, SSSE3, Wiedemann, TTS, rainbow, SSE2
1Paulo Mateus, Serge Vaudenay On Tamper-Resistance from a Theoretical Viewpoint. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Christof Paar Crypto Engineering: Some History and Some Case Studies. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nicolas Méloni, M. Anwar Hasan Elliptic Curve Scalar Multiplication Combining Yao's Algorithm and Double Bases. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Zeckendorf representation, point scalar multiplication, Yao’s algorithm, elliptic curve, Double-base number system
1Junfeng Fan, Frederik Vercauteren, Ingrid Verbauwhede Faster -Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF BN curves, Pairings, Modular reduction
1Christophe Clavier, Kris Gaj (eds.) Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Srini Devadas Physical Unclonable Functions and Secure Processors. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Matthieu Rivain Differential Fault Analysis on DES Middle Rounds. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Francesco Regazzoni 0001, Alessandro Cevrero, François-Xavier Standaert, Stéphane Badel, Theo Kluter, Philip Brisk, Yusuf Leblebici, Paolo Ienne A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1David Kammler, Diandian Zhang, Peter Schwabe, Hanno Scharwächter, Markus Langenberg, Dominik Auras, Gerd Ascheid, Rudolf Mathar Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Barreto-Naehrig curves, elliptic-curve cryptography (ECC), design-space exploration, Application-specific instruction-set processor (ASIP), arithmetic, pairing-based cryptography
1Emmanuel Prouff, Robert P. McEvoy First-Order Side-Channel Attacks on the Permutation Tables Countermeasure. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Permutation Tables, MIA, Side-Channel Attacks, Masking, CPA
1A. Theodore Markettos, Simon W. Moore The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Pierre-Alain Fouque, Gaëtan Leurent, Denis Réal, Frédéric Valette Practical Electromagnetic Template Attack on HMAC. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ghaith Hammouri, Aykutlu Dana, Berk Sunar CDs Have Fingerprints Too. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Optical discs, device identification, fuzzy extractor, fingerprinting
1Emilia Käsper, Peter Schwabe Faster and Timing-Attack Resistant AES-GCM. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Galois/Counter mode, cache-timing attacks, AES, fast implementations
1Rajat Subhra Chakraborty, Francis G. Wolff, Somnath Paul, Christos A. Papachristou, Swarup Bhunia MERO: A Statistical Approach for Hardware Trojan Detection. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Martin Hlavác Known-Plaintext-Only Attack on RSA-CRT with Montgomery Multiplication. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Montgomery exponentiation, electronic passport, RSA, side channel attack, Chinese Remainder Theorem, Hidden Number Problem
1Randy Torrance, Dick James The State-of-the-Art in IC Reverse Engineering. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Pierre-Alain Fouque, Denis Réal, Frédéric Valette, M'hamed Drissi The Carry Leakage on the Randomized Exponent Countermeasure. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Robert Szerwinski, Tim Güneysu Exploiting the Power of GPUs for Asymmetric Cryptography. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Asymmetric Cryptosystems, Graphics Processing Unit, RSA, ECC, DSA
1Michael Hutter, Jörn-Marc Schmidt, Thomas Plos RFID and Its Vulnerability to Faults. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Antenna Tearing, Optical Injections, RFID, Fault Analysis, Implementation Attacks, Electromagnetic Analysis
1Tim Güneysu, Christof Paar Ultra High Performance ECC over NIST Primes on Commercial FPGAs. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF FPGA, High-Performance, Elliptic Curve Cryptosystems
1Andrey Bogdanov Multiple-Differential Side-Channel Collision Attacks on AES. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multiple-differential collision attacks, AES, collision detection, side-channel attacks, DPA
1Christoph Bösch, Jorge Guajardo, Ahmad-Reza Sadeghi, Jamshid Shokrollahi, Pim Tuyls Efficient Helper Data Key Extractor on FPGAs. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intrinsic PUF, Fuzzy Extractor, Helper Data Algorithm, FPGAs, Implementation, Physical Unclonable Functions
1Andrey Bogdanov, Thomas Eisenbarth 0001, Andy Rupp, Christopher Wolf Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF TA-product, UOV, amended TTS, ECC, hardware implementation, cryptosystems, Rainbow
Displaying result #201 - #300 of 627 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license