|
|
PROOFS 2017: Author IndexAuthor | Papers |
---|
B | Basu Roy, Debapriya | Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands | Baumann, Christoph | Compositional Verification of Security Properties for Embedded Execution Platforms | Ben El Ouahma, Inès | Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes | D | Dam, Mads | Compositional Verification of Security Properties for Embedded Execution Platforms | Das, Poulami | Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands | Dasgupta, Pallab | An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach | E | Encrenaz, Emmanuelle | Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes | G | Graebnitz, Christoph | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs | H | Heydemann, Karine | Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes | K | Kumar, Ujjawal | An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach | M | Margraf, Marian | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs | Meunier, Quentin | Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes | Mukhopadhyay, Debdeep | Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands | Mukhopadhyay, Debdeep | An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach | O | Oswald, Manuel | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs | S | Saha, Sayandeep | An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach | Schwarz, Oliver | Compositional Verification of Security Properties for Embedded Execution Platforms | Soroceanu, Tudor | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs | W | Wisiol, Nils | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs | Z | Zengin, Benjamin | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs |
|
|
|