


Остановите войну!
for scientists:


default search action
CS2@HiPEAC 2015: Amsterdam, The Netherlands
- Andy D. Pimentel, Stephan Wong, Gerardo Pelosi, Israel Koren, Giovanni Agosta, Alessandro Barenghi:
Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015. ACM 2015, ISBN 978-1-4503-3187-6 - Alexander Herrmann, Marc Stöttinger:
Evaluation Tools for Multivariate Side-Channel Analysis. 1-6 - Rainer Plaga, Dominik Merli:
A new Definition and Classification of Physical Unclonable Functions. 7-12 - Harris E. Michail, Lenos Ioannou
, Artemios G. Voyiatzis:
Pipelined SHA-3 Implementations on FPGA: Architecture and Performance Analysis. 13-18 - Paulo Martins, Leonel Sousa
:
Stretching the limits of Programmable Embedded Devices for Public-key Cryptography. 19-24 - Loïc Zussa, Ingrid Exurville, Jean-Max Dutertre
, Jean-Baptiste Rigaud, Bruno Robisson, Assia Tria, Jessy Clédière
:
Evidence of an information leakage between logically independent blocks. 25-30 - Mohsen Toorani
:
On Continuous After-the-Fact Leakage-Resilient Key Exchange. 31-34 - Mathieu Carbone, Yannick Teglia, Philippe Maurine, Gilles R. Ducharme:
Interest of MIA in frequency domain? 35-38 - Wei He, Alexander Herrmann:
Placement Security Analysis for Side-Channel Resistant Dual-Rail Scheme in FPGA. 39-42 - Apostolos P. Fournaris, Nicolaos Klaoudatos, Nicolas Sklavos
, Christos Koulamas
:
Fault and Power Analysis Attack Resistant RNS based Edwards Curve Point Multiplication. 43-46

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.