The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "HOST"( http://dblp.L3S.de/Venues/HOST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/host

Publication years (Num. hits)
2008 (23) 2009 (18) 2010 (25) 2011 (31) 2012 (26) 2013 (27) 2014 (31) 2015 (31) 2016 (45) 2017 (49) 2018 (40) 2019 (26) 2020 (31) 2021 (29) 2022 (47) 2023 (31)
Publication types (Num. hits)
inproceedings(494) proceedings(16)
Venues (Conferences, Journals, ...)
HOST(510)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 510 publication records. Showing 510 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Richa Agrawal, Ranga Vemuri On state encoding against power analysis attacks for finite state controllers. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xavier Carpent, Norrathep Rattanavipanon, Gene Tsudik Remote attestation of IoT devices via SMARM: Shuffled measurements against roving malware. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Prashanth Mohan, Nail Etkin Can Akkaya, Burak Erbagci, Ken Mai A compact energy-efficient pseudo-static camouflaged logic family. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni 0001, Takanori Isobe 0001, Harunaga Hiwatari, Toru Akishita Inverse gating for low energy encryption. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kiruba Sankaran Subramani, Angelos Antonopoulos 0002, Ahmed Attia Abotabl, Aria Nosratinia, Yiorgos Makris INFECT: INconspicuous FEC-based Trojan: A hardware attack on an 802.11a/g wireless network. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vinay C. Patil, Arunkumar Vijayakumar, Daniel E. Holcomb, Sandip Kundu Improving reliability of weak PUFs via circuit techniques to enhance mismatch. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christopher Huth, Daniela Becker, Jorge Guajardo, Paul Duplys, Tim Güneysu LWE-based lossless computational fuzzy extractor for the Internet of Things. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thomas Broadfoot, Carl Sechen, Jeyavijayan (JV) Rajendran On designing optimal camouflaged layouts. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hoda Maleki, Reza Rahaeimehr, Chenglu Jin, Marten van Dijk New clone-detection approach for RFID-based supply chains. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Asmit De, Swaroop Ghosh Threshold voltage defined multi-input complex gates. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mostafa M. I. Taha, Arash Reyhani-Masoleh, Patrick Schaumont Stateless leakage resiliency from NLFSRs. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni 0001 Efficient configurations for block ciphers with unified ENC/DEC paths. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jaya Dofe, Qiaoyan Yu Analyzing security vulnerabilities of three-dimensional integrated circuits. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Joseph McMahan, Weilong Cui, Liang Xia, Jeff Heckey, Frederic T. Chong, Timothy Sherwood Challenging on-chip SRAM security with boot-state statistics. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Leonid Azriel, Shahar Kvatinsky Towards a memristive hardware secure hash function (MemHash). Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vincent Immler, Matthias Hiller, Johannes Obermaier, Georg Sigl Take a moment and have some t: Hypothesis testing on raw PUF data. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Joseph Sagisi, Joseph G. Tront, Randy C. Marchany Platform agnostic, scalable, and unobtrusive FPGA network processor design of moving target defense over IPv6 (MT6D) over IEEE 802.3 Ethernet. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alexandres Andreou, Andrey Bogdanov, Elmar Tischhauser Cache timing attacks on recent microarchitectures. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peter Samarin, Kerstin Lemke-Rust Detection of counterfeit ICs using public identification sequences. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Martin S. Kelly, Keith Mayes, John F. Walker Characterising a CPU fault attack model via run-time data analysis. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Goutham Pocklassery, Venkata K. Kajuruli, James F. Plusquellic, Fareena Saqib Physical unclonable functions and dynamic partial reconfiguration for security in resource-constrained embedded systems. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ye Yuan 0005, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi Memory-constrained implementation of lattice-based encryption scheme on standard Java Card. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Elad Carmon, Jean-Pierre Seifert, Avishai Wool Photonic side channel attacks against RSA. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1André Schaller, Wenjie Xiong 0001, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser 0001, Jakub Szefer Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Taimour Wehbe, Vincent John Mooney, Abdul Qadir Javaid, Omer T. Inan A novel physiological features-assisted architecture for rapidly distinguishing health problems from hardware Trojan attacks and errors in medical devices. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mitsuru Shiozaki, Takaya Kubota, Masashi Nakano, Yuuki Nakazawa, Takeshi Fujino Malicious CAN-message attack against advanced driving assistant system. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yu-Yun Dai, Robert K. Brayton Circuit recognition with deep learning. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1 2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017, McLean, VA, USA, May 1-5, 2017 Search on Bibsonomy HOST The full citation details ... 2017 DBLP  BibTeX  RDF
1Abhishek Chakraborty 0001, Ankit Mondal, Ankur Srivastava 0001 Correlation power analysis attack against STT-MRAM based cyptosystems. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Michel A. Kinsy, Shreeya Khadka, Mihailo Isakov, Anam Farrukh Hermes: Secure heterogeneous multicore architecture design. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zelalem Birhanu Aweke, Todd M. Austin Øzone: Efficient execution with zero timing leakage for modern microarchitectures. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Andrew M. Smith, Jackson R. Mayo, Vivian Kammler, Robert C. Armstrong, Yevgeniy Vorobeychik Using computational game theory to guide verification and security in hardware designs. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Muhammad Yasin, Bodhisatwa Mazumdar, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu TTLock: Tenacious and traceless logic locking. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Debayan Das, Shovan Maity, Saad Bin Nasir, Santosh Ghosh, Arijit Raychowdhury, Shreyas Sen High efficiency power side-channel attack immunity using noise injection in attenuated signature domain. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kaveh Shamsi, Meng Li 0004, Travis Meade, Zheng Zhao 0003, David Z. Pan, Yier Jin AppSAT: Approximately deobfuscating integrated circuits. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Michael Theodorides, David A. Wagner 0001 Breaking active-set backward-edge CFI. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kanad Sinha, Vasileios P. Kemerlis, Simha Sethumadhavan Reviving instruction set randomization. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tara Merin John, Syed Kamran Haider, Hamza Omar, Marten van Dijk Connecting the dots: Privacy leakage via write-access patterns to the main memory. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wenjie Che, Jim Plusquellic, Fareena Saqib A novel offset method for improving bitstring quality of a Hardware-Embedded delay PUF. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vaibhav Venugopal Rao, Ioannis Savidis Parameter biasing obfuscation for analog IP protection. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christophe Bobda, Taylor J. L. Whitaker, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla Synthesis of hardware sandboxes for Trojan mitigation in systems on chip. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Michael Vai, Karen Gettings, Theodore Lyszczarz Fabrication security and trust of domain-specific ASIC processors. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chongxi Bao, Ankur Srivastava 0001 Exploring timing side-channel attacks on path-ORAMs. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Aydin Aysu, Ye Wang 0014, Patrick Schaumont, Michael Orshansky A new maskless debiasing method for lightweight physical unclonable functions. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zhaoying Hu, Shu-Jen Han Creating security primitive by nanoscale manipulation of carbon nanotubes. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bertrand Cambou, Fatemeh Afghah, Derek Sonderegger, Jennifer Taggart, Hugh J. Barnaby, Michael N. Kozicki Ag conductive bridge RAMs for physical unclonable functions. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Troy Bryant, Sreeja Chowdhury, Domenic Forte, Mark M. Tehranipoor, Nima Maghari A stochastic all-digital weak physically unclonable function for analog/mixed-signal applications. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Brian Koziel, Reza Azarderakhsh, David Jao On secure implementations of quantum-resistant supersingular isogeny Diffie-Hellman. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Misiker Tadesse Aga, Zelalem Birhanu Aweke, Todd M. Austin When good protections go bad: Exploiting anti-DoS measures to accelerate rowhammer attacks. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Magnus Sundal, Ricardo Chaves Improving FPGA based SHA-3 structures. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl Automatic generation of high-performance modular multipliers for arbitrary mersenne primes on FPGAs. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chris Pavlina, Jacob Torrey, Kyle Temkin Abstract: Characterizing EEPROM for usage as a ubiquitous PUF source. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Maxime Lecomte, Jacques J. A. Fournier, Philippe Maurine Granularity and detection capability of an adaptive embedded Hardware Trojan detection system. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Elif Ozgen, Louiza Papachristodoulou, Lejla Batina Template attacks using classification algorithms. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zimu Guo, Md. Tauhidur Rahman 0001, Mark M. Tehranipoor, Domenic Forte A zero-cost approach to detect recycled SoC chips using embedded SRAM. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xiaolong Guo, Raj Gautam Dutta, Prabhat Mishra 0001, Yier Jin Scalable SoC trust verification using integrated theorem proving and model checking. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rui Liu 0005, Huaqiang Wu, Yachun Pang, He Qian, Shimeng Yu A highly reliable and tamper-resistant RRAM PUF: Design and experimental validation. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1David Whelihan, Kate Thurmer, Michael Vai A key-centric processor architecture for secure computing. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Luis Ramirez Rivera, Xiaofang Wang, Danai Chasaki A separation and protection scheme for on-chip memory blocks in FPGAs. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Peter Samarin, Kerstin Lemke-Rust, Christof Paar IP core protection using voltage-controlled side-channel receivers. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Michael Tempelmeier, Fabrizio De Santis, Jens-Peter Kaps, Georg Sigl An area-optimized serial implementation of ICEPOLE authenticated encryption schemes. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fathi Amsaad 0001, Atul Prasad, Chayanika Roychaudhuri, Mohammed Y. Niamat A novel security technique to generate truly random and highly reliable reconfigurable ROPUF-based cryptographic keys. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Qihang Shi, Navid Asadizanjani, Domenic Forte, Mark M. Tehranipoor A layout-driven framework to assess vulnerability of ICs to microprobing attacks. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Arun K. Kanuparthi, Jeyavijayan Rajendran, Ramesh Karri Controlling your control flow graph. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bradley D. Hopkins, John Shield, Chris North 0002 Redirecting DRAM memory pages: Examining the threat of system memory Hardware Trojans. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jacob Couch, Elizabeth Reilly, Morgan Schuyler, Bradley Barrett Functional block identification in circuit design recovery. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Subhadeep Banik, Andrey Bogdanov, Kazuhiko Minematsu Low-area hardware implementations of CLOC, SILC and AES-OTR. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1M. Sadegh Riazi, Neeraj K. R. Dantu, L. N. Vinay Gattu, Farinaz Koushanfar GenMatch: Secure DNA compatibility testing. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ryan L. Helinski, Edward I. Cole, Gideon Robertson, Jonathan Woodbridge, Lyndon G. Pierson Electronic forensic techniques for manufacturer attribution. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Chris Bradfield, Cynthia Sturton Model checking to find vulnerabilities in an instruction set architecture. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rui Qiao, Mark Seaborn A new approach for rowhammer attacks. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Arunkumar Vijayakumar, Vinay C. Patil, Charles B. Prado, Sandip Kundu Machine learning resistant strong PUF: Possible or a pipe dream? Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wei-Che Wang, Yair Yona, Suhas N. Diggavi, Puneet Gupta 0001 LEDPUF: Stability-guaranteed physical unclonable functions through locally enhanced defectivity. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Azalia Mirhoseini, Ahmad-Reza Sadeghi, Farinaz Koushanfar CryptoML: Secure outsourcing of big data machine learning applications. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Amey M. Kulkarni, Youngok K. Pino, Tinoosh Mohsenin Adaptive real-time Trojan detection framework through machine learning. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Burak Erbagci, Cagri Erbagci, Nail Etkin Can Akkaya, Ken Mai A secure camouflaged threshold voltage defined logic family. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Liwei Zhou, Yiorgos Makris Hardware-based workload forensics: Process reconstruction via TLB monitoring. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kun Yang, Domenic Forte, Mark M. Tehranipoor UCR: An unclonable chipless RFID tag. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Muhammad Yasin, Bodhisatwa Mazumdar, Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu SARLock: SAT attack resistant logic locking. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Brent Sherman, David Wheeler Hardware security risk assessment: A case study. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ofir Shwartz, Yitzhak Birk SDSM: Fast and scalable security support for directory-based distributed shared memory. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fatemeh Tehranipoor, Wei Yan 0005, John A. Chandy Robust hardware true random number generators using DRAM remanence effects. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alexander Wild, Georg T. Becker, Tim Güneysu On the problems of realizing reliable and efficient ring oscillator PUFs on FPGAs. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jonathan Graf Trust games: How game theory can guide the development of hardware Trojan detection methods. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ehsan Aerabi, A. Elhadi Amirouche, Houda Ferradi, Rémi Géraud, David Naccache, Jean Vuillemin The Conjoined Microprocessor. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Arvind Singh, Monodeep Kar, Anand Rajan, Vivek De, Saibal Mukhopadhyay Integrated all-digital low-dropout regulator as a countermeasure to power attack in encryption engines. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jakub Breier, Dirmanto Jap, Shivam Bhasin The other side of the coin: Analyzing software encoding schemes against fault injection attacks. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ye Zhang, Farinaz Koushanfar Robust privacy-preserving fingerprint authentication. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rodrigo Branco, Shay Gueron Blinded random corruption attacks. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Falk Schellenberg, Markus Finkeldey, Nils Gerhardt, Martin Hofmann 0017, Amir Moradi 0001, Christof Paar Large laser spots and fault sensitivity analysis. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Henrique Kawakami, David Ott, Hao Chi Wong, Ricardo Dahab, Roberto Gallo ACBuilder: A tool for hardware architecture security evaluation. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Johannes Bauer 0004, Sebastian Schinzel, Felix C. Freiling, Andreas Dewald Information leakage behind the curtain: Abusing anti-EMI features for covert communication. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sikhar Patranabis, Debapriya Basu Roy, Yash Shrivastava, Debdeep Mukhopadhyay, Santosh Ghosh Parsimonious design strategy for linear layers with high diffusion in block ciphers. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vladimir Rozic, Bohan Yang 0001, Wim Dehaene, Ingrid Verbauwhede Iterating Von Neumann's post-processing under hardware constraints. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni 0001, Takanori Isobe 0001, Harunaga Hiwatari, Toru Akishita Round gating for low energy block ciphers. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1William H. Robinson, Swarup Bhunia, Ryan Kastner (eds.) 2016 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016, McLean, VA, USA, May 3-5, 2016 Search on Bibsonomy HOST The full citation details ... 2016 DBLP  BibTeX  RDF
1Jeffrey Todd McDonald, Yong C. Kim, Todd R. Andel, Miles A. Forbes, James McVicar Functional polymorphism for intellectual property protection. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Abhishek Chakraborty 0001, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay A practical DPA on Grain v1 using LS-SVM. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Qian Wang 0022, An Wang 0001, Liji Wu, Gang Qu 0001, Guoshuang Zhang Template attack on masking AES based on fault sensitivity analysis. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 510 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license