Abstract
No abstract available.
Proceeding Downloads
Cited By
- Moradi A and Standaert F Moments-Correlating DPA Proceedings of the 2016 ACM Workshop on Theory of Implementation Security, (5-15)
- Buchmann J, Göpfert F, Güneysu T, Oder T and Pöppelmann T High-Performance and Lightweight Lattice-Based Public-Key Encryption Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, (2-9)
- Maurich I, Oder T and Güneysu T (2015). Implementing QC-MDPC McEliece Encryption, ACM Transactions on Embedded Computing Systems, 14:3, (1-27), Online publication date: 21-May-2015.
- Bernstein D, Chuengsatiansup C and Lange T Curve41417 Proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems --- CHES 2014 - Volume 8731, (316-334)
- Agosta G, Barenghi A, Maggi M and Pelosi G Compiler-based side channel vulnerability analysis and optimized countermeasures application Proceedings of the 50th Annual Design Automation Conference, (1-6)
- Parusiński M, Shariati S, Kamel D and Xavier-Standaert F Strong PUFs and their (physical) unpredictability Proceedings of the Workshop on Embedded Systems Security, (1-10)
Please enable JavaScript to view thecomments powered by Disqus.