|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 45 publication records. Showing 45 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Flavio D. Garcia |
Automotive Cyber Security: Lessons Learned and Research Challenges. |
CS2@HiPEAC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Luciano Bozzi, Lorenzo Di Giuseppe, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci, Walter Tiberti |
TinyWIDS: a WPM-based Intrusion Detection System for TinyOS2.x/802.15.4 Wireless Sensor Networks. |
CS2@HiPEAC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Felipe Valencia, Tobias Oder, Tim Güneysu, Francesco Regazzoni 0001 |
Exploring the Vulnerability of R-LWE Encryption to Fault Attacks. |
CS2@HiPEAC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Di Federico |
rev.ng: A Tale of Reverse Engineering, Dynamic Analysis and Translation of Binaries Using QEMU and LLVM. |
CS2@HiPEAC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Damien Couroussé, Thierno Barry, Bruno Robisson, Nicolas Belleville, Philippe Jaillon, Olivier Potin, Hélène Le Bouder, Jean-Louis Lanet, Karine Heydemann |
All paths lead to Rome: Polymorphic Runtime Code Generation for Embedded Systems. |
CS2@HiPEAC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Halil Kemal Taskin, Murat Cenk |
Speeding up Curve25519 using Toeplitz Matrix-vector Multiplication. |
CS2@HiPEAC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | John Goodacre, Mikel Luján, Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi (eds.) |
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, CS2 2018, Manchester, United Kingdom, January 24, 2018 |
CS2@HiPEAC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hermann Seuschek, Fabrizio De Santis, Oscar M. Guillen |
Side-channel leakage aware instruction scheduling. |
CS2@HiPEAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Karim M. Abdellatif, Damien Couroussé, Olivier Potin, Philippe Jaillon |
Filtering-based CPA: a successful side-channel attack against desynchronization countermeasures. |
CS2@HiPEAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sha Tao, Elena Dubrova |
Reliable low-overhead arbiter-based physical unclonable functions for resource-constrained IoT devices. |
CS2@HiPEAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Florian Wilde |
Large scale characterization of SRAM on infineon XMC microcontrollers as PUF. |
CS2@HiPEAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Frank K. Gürkaynak, Robert Schilling, Michael Muehlberghuber, Francesco Conti 0001, Stefan Mangard, Luca Benini |
Multi-core data analytics SoC with a flexible 1.76 Gbit/s AES-XTS cryptographic accelerator in 65 nm CMOS. |
CS2@HiPEAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Miraje Gentilal, Paulo Martins 0002, Leonel Sousa |
TrustZone-backed bitcoin wallet. |
CS2@HiPEAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mats Brorsson, Zhonghai Lu, Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi (eds.) |
Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2017, Stockholm, Sweden, January 24, 2017 |
CS2@HiPEAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sandhya Koteshwara, Chris H. Kim, Keshab K. Parhi |
Mode-based Obfuscation using Control-Flow Modifications. |
CS2@HiPEAC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Venu Nalla, Rajeev Anand Sahu, Vishal Saraswat |
Differential Fault Attack on SIMECK. |
CS2@HiPEAC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Apostolos P. Fournaris, Nicolas Sklavos 0001, Christos Koulamas |
A High Speed Scalar Multiplier for Binary Edwards Curves. |
CS2@HiPEAC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Thierno Barry, Damien Couroussé, Bruno Robisson |
Compilation of a Countermeasure Against Instruction-Skip Fault Attacks. |
CS2@HiPEAC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Noemie Beringuier-Boher, Marc Lacruche, David El-Baze, Jean-Max Dutertre, Jean-Baptiste Rigaud, Philippe Maurine |
Body Biasing Injection Attacks in Practice. |
CS2@HiPEAC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed Saeed 0003, Ali Ahmadinia, Mike Just |
Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses. |
CS2@HiPEAC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Karim M. Abdellatif, Roselyne Chotin-Avot, Habib Mehrez |
AEGIS-Based Efficient Solution for Secure Reconfiguration of FPGAs. |
CS2@HiPEAC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hermann Seuschek, Johann Heyszl, Fabrizio De Santis |
A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes. |
CS2@HiPEAC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Reza Azarderakhsh, Koray Karabina |
Efficient Algorithms and Architectures for Double Point Multiplication on Elliptic Curves. |
CS2@HiPEAC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vincent Immler, Maxim Hennig, Ludwig Kürzinger, Georg Sigl |
Practical Aspects of Quantization and Tamper-Sensitivity for Physically Obfuscated Keys. |
CS2@HiPEAC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Martin Palkovic, Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi (eds.) |
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20, 2016 |
CS2@HiPEAC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mathieu Carbone, Yannick Teglia, Philippe Maurine, Gilles R. Ducharme |
Interest of MIA in frequency domain? |
CS2@HiPEAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mohsen Toorani |
On Continuous After-the-Fact Leakage-Resilient Key Exchange. |
CS2@HiPEAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Herrmann, Marc Stöttinger |
Evaluation Tools for Multivariate Side-Channel Analysis. |
CS2@HiPEAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Andy D. Pimentel, Stephan Wong, Gerardo Pelosi, Israel Koren, Giovanni Agosta, Alessandro Barenghi (eds.) |
Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015 |
CS2@HiPEAC |
2015 |
DBLP BibTeX RDF |
|
1 | Rainer Plaga, Dominik Merli |
A new Definition and Classification of Physical Unclonable Functions. |
CS2@HiPEAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Apostolos P. Fournaris, Nicolaos Klaoudatos, Nicolas Sklavos 0001, Christos Koulamas |
Fault and Power Analysis Attack Resistant RNS based Edwards Curve Point Multiplication. |
CS2@HiPEAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Paulo Martins 0002, Leonel Sousa |
Stretching the limits of Programmable Embedded Devices for Public-key Cryptography. |
CS2@HiPEAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Loïc Zussa, Ingrid Exurville, Jean-Max Dutertre, Jean-Baptiste Rigaud, Bruno Robisson, Assia Tria, Jessy Clédière |
Evidence of an information leakage between logically independent blocks. |
CS2@HiPEAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Harris E. Michail, Lenos Ioannou, Artemios G. Voyiatzis |
Pipelined SHA-3 Implementations on FPGA: Architecture and Performance Analysis. |
CS2@HiPEAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wei He, Alexander Herrmann |
Placement Security Analysis for Side-Channel Resistant Dual-Rail Scheme in FPGA. |
CS2@HiPEAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael Lackner, Reinhard Berlach, Reinhold Weiss, Christian Steger |
Countering type confusion and buffer overflow attacks on Java smart cards by data type sensitive obfuscation. |
CS2@HiPEAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Raphael Spreitzer, Jörn-Marc Schmidt |
Group-signature schemes on constrained devices: the gap between theory and practice. |
CS2@HiPEAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Vishal Saraswat, Daniel Feldman, Denis Foo Kune, Satyajit Das |
Remote cache-timing attacks against AES. |
CS2@HiPEAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jens Knoop, Valentina Salapura, Israel Koren, Gerardo Pelosi (eds.) |
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014 |
CS2@HiPEAC |
2014 |
DBLP BibTeX RDF |
|
1 | Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Youssef Souissi |
High-order timing attacks. |
CS2@HiPEAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Pierre Schnarz, Joachim Wietzke, Ingo Stengel |
Towards attacks on restricted memory areas through co-processors in embedded multi-OS environments via malicious firmware injection. |
CS2@HiPEAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Stjepan Picek, Baris Ege, Lejla Batina, Domagoj Jakobovic, Lukasz Chmielewski, Marin Golub |
On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box. |
CS2@HiPEAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Robert M. Seepers, Christos Strydis, Ioannis Sourdis, Chris I. De Zeeuw |
Adaptive entity-identifier generation for IMD emergency access. |
CS2@HiPEAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kamil Gomina, Philippe Gendrier, Philippe Candelier, Jean-Baptiste Rigaud, Assia Tria |
Detecting positive voltage attacks on CMOS circuits. |
CS2@HiPEAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Reinhard Berlach, Michael Lackner, Christian Steger, Johannes Loinig, Ernst Haselsteiner |
Memory-efficient on-card byte code verification for Java cards. |
CS2@HiPEAC |
2014 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #45 of 45 (100 per page; Change: )
|
|