The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CHES"( http://dblp.L3S.de/Venues/CHES )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ches

Publication years (Num. hits)
1999 (30) 2000 (28) 2001 (34) 2002 (43) 2003 (35) 2004 (33) 2005 (33) 2006 (36) 2007 (32) 2008 (30) 2009 (33) 2010 (31) 2011 (34) 2012 (33) 2013 (28) 2014 (34) 2015 (35) 2016 (31) 2017 (34)
Publication types (Num. hits)
inproceedings(608) proceedings(19)
Venues (Conferences, Journals, ...)
CHES(627)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 666 occurrences of 255 keywords

Results
Found 627 publication records. Showing 627 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Stéphanie Anceau, Pierre Bleuet, Jessy Clédière, Laurent Maingault, Jean-Luc Rainard, Rémi Tucoulou Nanofocused X-Ray Beam to Reprogram Secure Circuits. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Joan Daemen Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Robert Primas, Peter Pessl, Stefan Mangard Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Charlotte Bonte, Carl Bootland, Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren Faster Homomorphic Function Evaluation Using Non-integral Base Encoding. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jérémy Jean, Amir Moradi 0001, Thomas Peyrin, Pascal Sasdrich Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider 0002, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier Gimli : A Cross-Platform Permutation. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nisha Jacob, Johann Heyszl, Andreas Zankl, Carsten Rolfes, Georg Sigl How to Break Secure Boot on FPGA SoCs Through Malicious Hardware. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vincent Immler, Robert Specht, Florian Unterstein Your Rails Cannot Hide from Localized EM: How Dual-Rail Logic Fails on FPGAs. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hildur Ólafsdóttir, Aanjhan Ranganathan, Srdjan Capkun On the Security of Carrier Phase-Based Ranging. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zhe Liu 0001, Patrick Longa, Geovandro C. C. F. Pereira, Oscar Reparaz, Hwajeong Seo Four \mathbb Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange 0001, Christine van Vredendaal, Yuval Yarom Sliding Right into Disaster: Left-to-Right Sliding Windows Leak. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wieland Fischer, Naofumi Homma (eds.) Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud, Srinivas Vivek Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Andreas Hülsing, Joost Rijneveld, John M. Schanck, Peter Schwabe High-Speed Key Encapsulation from NTRU. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede Fast Leakage Assessment. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Matthias Hiller, Aysun Gurur Önalan Hiding Secrecy Leakage in Leaky Helper Data. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wen Wang 0007, Jakub Szefer, Ruben Niederhagen FPGA-based Key Generator for the Niederreiter Cryptosystem Using Binary Goppa Codes. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Melissa Rossi, Mike Hamburg, Michael Hutter, Mark E. Marson A Side-Channel Assisted Cryptanalytic Attack Against QcBits. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tiago B. S. Reis, Diego F. Aranha, Julio López Hernandez PRESENT Runs Fast - Efficient and Secure Implementation in Software. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth 0001 CacheZoom: How SGX Amplifies the Power of Cache Attacks. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hannes Groß, Stefan Mangard Reconciling d+1 Masking in Hardware and Software. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron High-Order Conversion from Boolean to Arithmetic Masking. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Romain Poussier, Yuanyuan Zhou, François-Xavier Standaert A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi Blockcipher-Based Authenticated Encryption: How Small Can We Go? Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marios O. Choudary, Pantelimon George Popescu Back to Massey: Impressively Fast, Scalable and Tight Security Evaluation Tools. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer, Srdjan Capkun Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Eleonora Cagli, Cécile Dumas, Emmanuel Prouff Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anthony Journault, François-Xavier Standaert Very High Order Masking: Efficient Implementation and Security Evaluation. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christophe Clavier, Léo Reynaud Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of Leakages. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, Domenic Forte Novel Bypass Attack and BDD-based Tradeoff Analysis Against All Known Logic Locking Attacks. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Björn Haase, Benoît Labrique Making Password Authenticated Key Exchange Suitable for Resource-Constrained Industrial Control Devices. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tung Chou McBits Revisited. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sarani Bhattacharya, Debdeep Mukhopadhyay Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day (Mandel) Yu Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joppe W. Bos, Charles Hubain, Wil Michiels, Philippe Teuwen Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul Correlated Extra-Reductions Defeat Blinded Regular Exponentiation. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yuval Yarom, Daniel Genkin, Nadia Heninger CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Romain Poussier, François-Xavier Standaert, Vincent Grosso Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert Strong Machine Learning Attack Against PUFs with No Mathematical Model. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mehmet Sinan Inci, Berk Gülmezoglu, Gorka Irazoqui, Thomas Eisenbarth 0001, Berk Sunar Cache Attacks Enable Bulk Key Recovery on the Cloud. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shalabh Jain, Jorge Guajardo Physical Layer Group Key Agreement for Automotive Controller Area Networks. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dhiman Saha, Dipanwita Roy Chowdhury EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joost Renes, Peter Schwabe, Benjamin Smith 0003, Lejla Batina \mu Kummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Thomaz Oliveira, Julio López Hernandez, Francisco Rodríguez-Henríquez Software Implementation of Koblitz Curves over Quadratic Fields. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Stefan Nürnberger, Christian Rossow - vatiCAN - Vetted, Authenticated CAN Bus. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Leon Groot Bruinderink, Andreas Hülsing, Tanja Lange 0001, Yuval Yarom Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jürgen Pulkus, Srinivas Vivek Reducing the Number of Non-linear Multiplications in Masking Schemes. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kimmo Järvinen 0001, Andrea Miele, Reza Azarderakhsh, Patrick Longa Four ℚ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dahmun Goudarzi, Matthieu Rivain On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Markus Kammerstetter, Markus Muellner, Daniel Burian, Christian Kudera, Wolfgang Kastner Efficient High-Speed WPA2 Brute Force Attacks Using Scalable Low-Cost FPGA Clustering. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alberto Battistello, Jean-Sébastien Coron, Emmanuel Prouff, Rina Zeitoun Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1François Durvaux, François-Xavier Standaert, Santos Merino Del Pozo Towards Easy Leakage Certification. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yang Xie, Ankur Srivastava Mitigating SAT Attack on Logic Locking. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Heiko Lohrke, Shahin Tajik, Christian Boit, Jean-Pierre Seifert No Place to Hide: Contactless Probing of Secret Data on FPGAs. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Thomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen Masking AES with d+1 Shares in Hardware. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tung Chou QcBits: Constant-Time Small-Key Code-Based Cryptography. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron, Aurélien Greuet, Emmanuel Prouff, Rina Zeitoun Faster Evaluation of SBoxes via Common Shares. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Andrew D. Zonenberg, Bülent Yener Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wenjie Xiong 0001, André Schaller, Nikolaos Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser 0001, Jakub Szefer Run-Time Accessible DRAM PUFs in Commodity Devices. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Samaneh Ghandali, Georg T. Becker, Daniel Holcomb, Christof Paar A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi 0001, Tobias Schneider 0002 Strong 8-bit Sboxes with Efficient Masking in Hardware. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Benedikt Gierlichs, Axel Y. Poschmann (eds.) Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aurélie Bauer, Damien Vergnaud Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhe Liu 0001, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede Efficient Ring-LWE Encryption on 8-Bit AVR Processors. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michael Hutter, Jürgen Schilling, Peter Schwabe, Wolfgang Wieser NaCl's Crypto_box in Hardware. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sujoy Sinha Roy, Kimmo Järvinen 0001, Ingrid Verbauwhede Lightweight Coprocessor for Koblitz Curves: 283-Bit ECC Including Scalar Conversion with only 4300 Gates. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Amir Moradi 0001, Alexander Wild Assessment of Hiding the Higher-Order Leakages in Hardware - What Are the Achievements Versus Overheads? Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, Guang Gong The Simeck Family of Lightweight Block Ciphers. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, Debdeep Mukhopadhyay Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Werner Schindler Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Georg T. Becker The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede A Masked Ring-LWE Implementation. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sarani Bhattacharya, Debdeep Mukhopadhyay Who Watches the Watchmen?: Utilizing Performance Monitors for Compromising Keys of RSA on Intel Platforms. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christian Kison, Jürgen Frinken, Christof Paar Finding the AES Bits in the Haystack: Reverse Engineering and SCA Using Voltage Contrast. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont, Moti Yung End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1John Kelsey, Kerry A. McKay, Meltem Sönmez Turan Predictive Models for Min-entropy Estimation. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff Improved Side-Channel Analysis of Finite-Field Multiplication. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sujoy Sinha Roy, Kimmo Järvinen 0001, Frederik Vercauteren, Vassil S. Dimitrov, Ingrid Verbauwhede Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yarkin Doröz, Erdinç Öztürk, Erkay Savas, Berk Sunar Accelerating LTV Based Homomorphic Encryption in Reconfigurable Hardware. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Carolyn Whitnall, Elisabeth Oswald Robust Profiling for DPA-Style Attacks. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, Ingrid Verbauwhede DPA, Bitslicing and Masking at 1 GHz. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tobias Schneider 0002, Amir Moradi 0001 Leakage Assessment Methodology - A Clear Roadmap for Side-Channel Evaluations. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Weijia Wang, Yu Yu 0001, Junrong Liu, Zheng Guo 0001, François-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu Evaluation and Improvement of Generic-Emulating DPA Attacks. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi TriviA: A Fast and Secure Authenticated Encryption Scheme. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jake Longo, Elke De Mulder, Dan Page, Michael Tunstall SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tim Güneysu, Helena Handschuh (eds.) Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Santos Merino Del Pozo, François-Xavier Standaert Blind Source Separation from Single Measurements Using Singular Spectrum Analysis. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, Takafumi Aoki Highly Efficient GF(28) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia Multi-variate High-Order Attacks of Shuffled Tables Recomputation. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Patrick Haddad, Viktor Fischer, Florent Bernard, Jean Nicolai A Physical Approach for Stochastic Modeling of TERO-Based TRNG. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Thomas Pöppelmann, Michael Naehrig, Andrew Putnam, Adrián Macías Accelerating Homomorphic Evaluation on Reconfigurable Hardware. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Karim Bigou, Arnaud Tisserand Single Base Modular Multiplication for Efficient Hardware RNS Implementations of ECC. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion 0001, Olivier Rioul Less is More - Dimensionality Reduction from a Theoretical Perspective. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Iwen Coisel, Ignacio Sanchez Improved Cryptanalysis of the DECT Standard Cipher. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Roel Maes, Vincent van der Leest, Erik van der Sluis, Frans M. J. Willems Secure Key Generation from Biased PUFs. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yanting Ren, An Wang 0001, Liji Wu Transient-Steady Effect Attack on Block Ciphers. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 627 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license