Home
EPiC Series
Kalpa Publications
Preprints
For Authors
For Editors
Volume
•
Abstracts
•
Preface
•
Authors
•
Keywords
•
BibTex Entries
PROOFS 2017: Keyword Index
Keyword
Papers
a
ARMv8
Compositional Verification of Security Properties for Embedded Execution Platforms
asymmetric leakage
Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands
b
block cipher
An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach
c
countermeasure
Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands
d
Data Mining
An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach
decomposition
Compositional Verification of Security Properties for Embedded Execution Platforms
Differential Fault Attack
An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach
e
ECC
Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands
f
field multiplications
Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands
formal evaluation
Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes
formal verification
Compositional Verification of Security Properties for Embedded Execution Platforms
h
hardware platform
Compositional Verification of Security Properties for Embedded Execution Platforms
HCCA
Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands
Hypervisor
Compositional Verification of Security Properties for Embedded Execution Platforms
m
machine learning
Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs
Masking
Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes
p
PAC learning
Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs
Physical Unclonable Functions
Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs
s
security analysis
Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes
Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs
side-channel attacks
Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes
SoC
Compositional Verification of Security Properties for Embedded Execution Platforms
System Security
Compositional Verification of Security Properties for Embedded Execution Platforms
Copyright © 2012-2024 easychair.org. All rights reserved.