BibTeX records: Bruno Robisson

download as .bib file

@inproceedings{DBLP:conf/adhoc-now/Bouder0LLRT18,
  author    = {H{\'{e}}l{\`{e}}ne Le Bouder and
               Ga{\"{e}}l Thomas and
               Ronan Lashermes and
               Yanis Linge and
               Bruno Robisson and
               Assia Tria},
  title     = {An Evaluation Tool for Physical Attacks},
  booktitle = {Ad-hoc, Mobile, and Wireless Networks - 17th International Conference
               on Ad Hoc Networks and Wireless, {ADHOC-NOW} 2018, Saint-Malo, France,
               September 5-7, 2018, Proceedings},
  pages     = {112--119},
  year      = {2018},
  crossref  = {DBLP:conf/adhoc-now/2018},
  url       = {https://doi.org/10.1007/978-3-030-00247-3\_10},
  doi       = {10.1007/978-3-030-00247-3\_10},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/adhoc-now/Bouder0LLRT18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipeac/CourousseBRBJPB18,
  author    = {Damien Courouss{\'{e}} and
               Thierno Barry and
               Bruno Robisson and
               Nicolas Belleville and
               Philippe Jaillon and
               Olivier Potin and
               H{\'{e}}l{\`{e}}ne Le Bouder and
               Jean{-}Louis Lanet and
               Karine Heydemann},
  title     = {All paths lead to Rome: Polymorphic Runtime Code Generation for Embedded
               Systems},
  booktitle = {Proceedings of the Fifth Workshop on Cryptography and Security in
               Computing Systems, {CS2} 2018, Manchester, United Kingdom, January
               24, 2018},
  pages     = {17--18},
  year      = {2018},
  crossref  = {DBLP:conf/hipeac/2018cs},
  url       = {https://doi.org/10.1145/3178291.3178296},
  doi       = {10.1145/3178291.3178296},
  timestamp = {Tue, 18 Dec 2018 20:10:05 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hipeac/CourousseBRBJPB18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/BellevilleHCBRSC18,
  author    = {Nicolas Belleville and
               Karine Heydemann and
               Damien Courouss{\'{e}} and
               Thierno Barry and
               Bruno Robisson and
               Abderrahmane Seriai and
               Henri{-}Pierre Charles},
  title     = {Automatic Application of Software Countermeasures Against Physical
               Attacks},
  booktitle = {Cyber-Physical Systems Security},
  pages     = {135--155},
  year      = {2018},
  crossref  = {DBLP:books/sp/K2018},
  url       = {https://doi.org/10.1007/978-3-319-98935-8\_7},
  doi       = {10.1007/978-3-319-98935-8\_7},
  timestamp = {Fri, 08 Mar 2019 12:57:04 +0100},
  biburl    = {https://dblp.org/rec/bib/books/sp/18/BellevilleHCBRSC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/RobissonASHWBP17,
  author    = {Bruno Robisson and
               Michel Agoyan and
               Patrick Soquet and
               S{\'{e}}bastien Le Henaff and
               Franck Wajsb{\"{u}}rt and
               Pirouz Bazargan{-}Sabet and
               Guillaume Phan},
  title     = {Smart security management in secure devices},
  journal   = {J. Cryptographic Engineering},
  volume    = {7},
  number    = {1},
  pages     = {47--61},
  year      = {2017},
  url       = {https://doi.org/10.1007/s13389-016-0143-4},
  doi       = {10.1007/s13389-016-0143-4},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jce/RobissonASHWBP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourousseBRJPL17,
  author    = {Damien Courouss{\'{e}} and
               Thierno Barry and
               Bruno Robisson and
               Philippe Jaillon and
               Olivier Potin and
               Jean{-}Louis Lanet},
  title     = {Runtime Code Polymorphism as a Protection Against Side Channel Attacks},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {699},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/699},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CourousseBRJPL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/RobissonB16,
  author    = {Bruno Robisson and
               H{\'{e}}l{\`{e}}ne Le Bouder},
  title     = {Physical functions: the common factor of side-channel and fault attacks?},
  journal   = {J. Cryptographic Engineering},
  volume    = {6},
  number    = {3},
  pages     = {217--227},
  year      = {2016},
  url       = {https://doi.org/10.1007/s13389-015-0111-4},
  doi       = {10.1007/s13389-015-0111-4},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jce/RobissonB16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arc/AbdellatifCFR16,
  author    = {Karim M. Abdellatif and
               Christian Cornesse and
               Jacques J. A. Fournier and
               Bruno Robisson},
  title     = {New Partitioning Approach for Hardware Trojan Detection Using Side-Channel
               Measurements},
  booktitle = {Applied Reconfigurable Computing - 12th International Symposium, {ARC}
               2016, Mangaratiba, RJ, Brazil, March 22-24, 2016, Proceedings},
  pages     = {171--182},
  year      = {2016},
  crossref  = {DBLP:conf/arc/2016},
  url       = {https://doi.org/10.1007/978-3-319-30481-6\_14},
  doi       = {10.1007/978-3-319-30481-6\_14},
  timestamp = {Tue, 14 May 2019 10:00:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/arc/AbdellatifCFR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipeac/BarryCR16,
  author    = {Thierno Barry and
               Damien Courouss{\'{e}} and
               Bruno Robisson},
  title     = {Compilation of a Countermeasure Against Instruction-Skip Fault Attacks},
  booktitle = {Proceedings of the Third Workshop on Cryptography and Security in
               Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20,
               2016},
  pages     = {1--6},
  year      = {2016},
  crossref  = {DBLP:conf/hipeac/2016cs},
  url       = {https://doi.org/10.1145/2858930.2858931},
  doi       = {10.1145/2858930.2858931},
  timestamp = {Tue, 06 Nov 2018 16:58:21 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hipeac/BarryCR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/CourousseBRJPL16,
  author    = {Damien Courouss{\'{e}} and
               Thierno Barry and
               Bruno Robisson and
               Philippe Jaillon and
               Olivier Potin and
               Jean{-}Louis Lanet},
  title     = {Runtime Code Polymorphism as a Protection Against Side Channel Attacks},
  booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
               Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
               2016, Proceedings},
  pages     = {136--152},
  year      = {2016},
  crossref  = {DBLP:conf/wistp/2016},
  url       = {https://doi.org/10.1007/978-3-319-45931-8\_9},
  doi       = {10.1007/978-3-319-45931-8\_9},
  timestamp = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wistp/CourousseBRJPL16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/NgoEBDGNRR15,
  author    = {Xuan Thuy Ngo and
               Ingrid Exurville and
               Shivam Bhasin and
               Jean{-}Luc Danger and
               Sylvain Guilley and
               Zakaria Najm and
               Jean{-}Baptiste Rigaud and
               Bruno Robisson},
  title     = {Hardware trojan detection by delay and electromagnetic measurements},
  booktitle = {Proceedings of the 2015 Design, Automation {\&} Test in Europe
               Conference {\&} Exhibition, {DATE} 2015, Grenoble, France, March
               9-13, 2015},
  pages     = {782--787},
  year      = {2015},
  crossref  = {DBLP:conf/date/2015},
  url       = {http://dl.acm.org/citation.cfm?id=2755931},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/date/NgoEBDGNRR15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dft/ChampeixBDRLS15,
  author    = {Clement Champeix and
               Nicolas Borrel and
               Jean{-}Max Dutertre and
               Bruno Robisson and
               Mathieu Lisart and
               Alexandre Sarafianos},
  title     = {{SEU} sensitivity and modeling using pico-second pulsed laser stimulation
               of a {D} Flip-Flop in 40 nm {CMOS} technology},
  booktitle = {2015 {IEEE} International Symposium on Defect and Fault Tolerance
               in {VLSI} and Nanotechnology Systems, {DFTS} 2015, Amherst, MA, USA,
               October 12-14, 2015},
  pages     = {177--182},
  year      = {2015},
  crossref  = {DBLP:conf/dft/2015},
  url       = {https://doi.org/10.1109/DFT.2015.7315158},
  doi       = {10.1109/DFT.2015.7315158},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dft/ChampeixBDRLS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipeac/ZussaEDRRTC15,
  author    = {Lo{\"{\i}}c Zussa and
               Ingrid Exurville and
               Jean{-}Max Dutertre and
               Jean{-}Baptiste Rigaud and
               Bruno Robisson and
               Assia Tria and
               Jessy Cl{\'{e}}di{\`{e}}re},
  title     = {Evidence of an information leakage between logically independent blocks},
  booktitle = {Proceedings of the Second Workshop on Cryptography and Security in
               Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January
               19-21, 2015},
  pages     = {25--30},
  year      = {2015},
  crossref  = {DBLP:conf/hipeac/2015cs},
  url       = {https://doi.org/10.1145/2694805.2694810},
  doi       = {10.1145/2694805.2694810},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hipeac/ZussaEDRRTC15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/ExurvilleZRR15,
  author    = {Ingrid Exurville and
               Lo{\"{\i}}c Zussa and
               Jean{-}Baptiste Rigaud and
               Bruno Robisson},
  title     = {Resilient hardware Trojans detection based on path delay measurements},
  booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
               {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages     = {151--156},
  year      = {2015},
  crossref  = {DBLP:conf/host/2015},
  url       = {https://doi.org/10.1109/HST.2015.7140254},
  doi       = {10.1109/HST.2015.7140254},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/host/ExurvilleZRR15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iolts/ChampeixBDRLS15,
  author    = {Clement Champeix and
               Nicolas Borrel and
               Jean{-}Max Dutertre and
               Bruno Robisson and
               Mathieu Lisart and
               Alexandre Sarafianos},
  title     = {Experimental validation of a Bulk Built-In Current Sensor for detecting
               laser-induced currents},
  booktitle = {21st {IEEE} International On-Line Testing Symposium, {IOLTS} 2015,
               Halkidiki, Greece, July 6-8, 2015},
  pages     = {150--155},
  year      = {2015},
  crossref  = {DBLP:conf/iolts/2015},
  url       = {https://doi.org/10.1109/IOLTS.2015.7229849},
  doi       = {10.1109/IOLTS.2015.7229849},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iolts/ChampeixBDRLS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RobissonASHWBP15,
  author    = {Bruno Robisson and
               Michel Agoyan and
               Patrick Soquet and
               S{\'{e}}bastien Le Henaff and
               Franck Wajsb{\"{u}}rt and
               Pirouz Bazargan{-}Sabet and
               Guillaume Phan},
  title     = {Smart Security Management in Secure Devices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {670},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/670},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/RobissonASHWBP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MoroHER14,
  author    = {Nicolas Moro and
               Karine Heydemann and
               Emmanuelle Encrenaz and
               Bruno Robisson},
  title     = {Formal verification of a software countermeasure against instruction
               skip attacks},
  journal   = {J. Cryptographic Engineering},
  volume    = {4},
  number    = {3},
  pages     = {145--156},
  year      = {2014},
  url       = {https://doi.org/10.1007/s13389-014-0077-7},
  doi       = {10.1007/s13389-014-0077-7},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jce/MoroHER14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MoroHDRE14,
  author    = {Nicolas Moro and
               Karine Heydemann and
               Amine Dehbaoui and
               Bruno Robisson and
               Emmanuelle Encrenaz},
  title     = {Experimental evaluation of two software countermeasures against fault
               attacks},
  booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security
               and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages     = {112--117},
  year      = {2014},
  crossref  = {DBLP:conf/host/2014},
  url       = {https://doi.org/10.1109/HST.2014.6855580},
  doi       = {10.1109/HST.2014.6855580},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/host/MoroHDRE14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/ZussaDCR14,
  author    = {Lo{\"{\i}}c Zussa and
               Jean{-}Max Dutertre and
               Jessy Cl{\'{e}}di{\`{e}}re and
               Bruno Robisson},
  title     = {Analysis of the fault injection mechanism related to negative and
               positive power supply glitches using an on-chip voltmeter},
  booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security
               and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages     = {130--135},
  year      = {2014},
  crossref  = {DBLP:conf/host/2014},
  url       = {https://doi.org/10.1109/HST.2014.6855583},
  doi       = {10.1109/HST.2014.6855583},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/host/ZussaDCR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CourousseRLBNJL14,
  author    = {Damien Courouss{\'{e}} and
               Bruno Robisson and
               Jean{-}Louis Lanet and
               Thierno Barry and
               Hassan N. Noura and
               Philippe Jaillon and
               Philippe Lalev{\'{e}}e},
  title     = {{COGITO:} Code Polymorphism to Secure Devices},
  booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
               on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages     = {451--456},
  year      = {2014},
  crossref  = {DBLP:conf/secrypt/2014},
  url       = {https://doi.org/10.5220/0005113704510456},
  doi       = {10.5220/0005113704510456},
  timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/CourousseRLBNJL14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vlsi/ChusseauORJMTBVSLBRRR14,
  author    = {Laurent Chusseau and
               Rachid Omarouayache and
               Jeremy Raoult and
               Sylvie Jarrix and
               Philippe Maurine and
               Karim Tobich and
               Alexandre Boyer and
               Bertrand Vrignon and
               John Shepherd and
               Thanh{-}Ha Le and
               Ma{\"{e}}l Berthier and
               Lionel Rivi{\`{e}}re and
               Bruno Robisson and
               Anne{-}Lise Ribotta},
  title     = {Electromagnetic analysis, deciphering and reverse engineering of integrated
               circuits {(E-MATA} {HARI)}},
  booktitle = {22nd International Conference on Very Large Scale Integration, VLSI-SoC,
               Playa del Carmen, Mexico, October 6-8, 2014},
  pages     = {1--6},
  year      = {2014},
  crossref  = {DBLP:conf/vlsi/2014soc},
  url       = {https://doi.org/10.1109/VLSI-SoC.2014.7004189},
  doi       = {10.1109/VLSI-SoC.2014.7004189},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/vlsi/ChusseauORJMTBVSLBRRR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vlsi/MaistriLBAFRMMDL14,
  author    = {Paolo Maistri and
               R{\'{e}}gis Leveugle and
               Lilian Bossuet and
               Alain Aubert and
               Viktor Fischer and
               Bruno Robisson and
               Nicolas Moro and
               Philippe Maurine and
               Jean{-}Max Dutertre and
               Mathieu Lisart},
  title     = {Electromagnetic analysis and fault injection onto secure circuits},
  booktitle = {22nd International Conference on Very Large Scale Integration, VLSI-SoC,
               Playa del Carmen, Mexico, October 6-8, 2014},
  pages     = {1--6},
  year      = {2014},
  crossref  = {DBLP:conf/vlsi/2014soc},
  url       = {https://doi.org/10.1109/VLSI-SoC.2014.7004182},
  doi       = {10.1109/VLSI-SoC.2014.7004182},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/vlsi/MaistriLBAFRMMDL14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MoroDHRE14,
  author    = {Nicolas Moro and
               Amine Dehbaoui and
               Karine Heydemann and
               Bruno Robisson and
               Emmanuelle Encrenaz},
  title     = {Electromagnetic fault injection: towards a fault model on a 32-bit
               microcontroller},
  journal   = {CoRR},
  volume    = {abs/1402.6421},
  year      = {2014},
  url       = {http://arxiv.org/abs/1402.6421},
  archivePrefix = {arXiv},
  eprint    = {1402.6421},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/MoroDHRE14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MoroHER14,
  author    = {Nicolas Moro and
               Karine Heydemann and
               Emmanuelle Encrenaz and
               Bruno Robisson},
  title     = {Formal verification of a software countermeasure against instruction
               skip attacks},
  journal   = {CoRR},
  volume    = {abs/1402.6461},
  year      = {2014},
  url       = {http://arxiv.org/abs/1402.6461},
  archivePrefix = {arXiv},
  eprint    = {1402.6461},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/MoroHER14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MoroHDRE14,
  author    = {Nicolas Moro and
               Karine Heydemann and
               Amine Dehbaoui and
               Bruno Robisson and
               Emmanuelle Encrenaz},
  title     = {Experimental evaluation of two software countermeasures against fault
               attacks},
  journal   = {CoRR},
  volume    = {abs/1407.6019},
  year      = {2014},
  url       = {http://arxiv.org/abs/1407.6019},
  archivePrefix = {arXiv},
  eprint    = {1407.6019},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/MoroHDRE14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouderLLRT14a,
  author    = {H{\'{e}}l{\`{e}}ne Le Bouder and
               Ronan Lashermes and
               Yanis Linge and
               Bruno Robisson and
               Assia Tria},
  title     = {A Unified Formalism for Physical Attacks},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {682},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/682},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BouderLLRT14a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RobissonB14,
  author    = {Bruno Robisson and
               H{\'{e}}l{\`{e}}ne Le Bouder},
  title     = {Physical functions : the common factor of side-channel and fault attacks
               ?},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {927},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/927},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/RobissonB14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/MoroDHRE13,
  author    = {Nicolas Moro and
               Amine Dehbaoui and
               Karine Heydemann and
               Bruno Robisson and
               Emmanuelle Encrenaz},
  title     = {Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit
               Microcontroller},
  booktitle = {2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los
               Alamitos, CA, USA, August 20, 2013},
  pages     = {77--88},
  year      = {2013},
  crossref  = {DBLP:conf/fdtc/2013},
  url       = {https://doi.org/10.1109/FDTC.2013.9},
  doi       = {10.1109/FDTC.2013.9},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fdtc/MoroDHRE13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/BouderGRT13,
  author    = {H{\'{e}}l{\`{e}}ne Le Bouder and
               Sylvain Guilley and
               Bruno Robisson and
               Assia Tria},
  title     = {Fault Injection to Reverse Engineer DES-Like Cryptosystems},
  booktitle = {Foundations and Practice of Security - 6th International Symposium,
               {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected
               Papers},
  pages     = {105--121},
  year      = {2013},
  crossref  = {DBLP:conf/fps/2013},
  url       = {https://doi.org/10.1007/978-3-319-05302-8\_7},
  doi       = {10.1007/978-3-319-05302-8\_7},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fps/BouderGRT13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/recosoc/ExurvilleFDRT13,
  author    = {Ingrid Exurville and
               Jacques J. A. Fournier and
               Jean{-}Max Dutertre and
               Bruno Robisson and
               Assia Tria},
  title     = {Practical measurements of data path delays for {IP} authentication
               {\&} integrity verification},
  booktitle = {2013 8th International Workshop on Reconfigurable and Communication-Centric
               Systems-on-Chip (ReCoSoC), Darmstadt, Germany, July 10-12, 2013},
  pages     = {1--6},
  year      = {2013},
  crossref  = {DBLP:conf/recosoc/2013},
  url       = {https://doi.org/10.1109/ReCoSoC.2013.6581551},
  doi       = {10.1109/ReCoSoC.2013.6581551},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/recosoc/ExurvilleFDRT13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeydemannMER13,
  author    = {Karine Heydemann and
               Nicolas Moro and
               Emmanuelle Encrenaz and
               Bruno Robisson},
  title     = {Formal verification of a software countermeasure against instruction
               skip attacks},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {679},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/679},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/HeydemannMER13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/BayonBAFPRM12,
  author    = {Pierre Bayon and
               Lilian Bossuet and
               Alain Aubert and
               Viktor Fischer and
               Fran{\c{c}}ois Poucheret and
               Bruno Robisson and
               Philippe Maurine},
  title     = {Contactless Electromagnetic Active Attack on Ring Oscillator Based
               True Random Number Generator},
  booktitle = {Constructive Side-Channel Analysis and Secure Design - Third International
               Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings},
  pages     = {151--166},
  year      = {2012},
  crossref  = {DBLP:conf/cosade/2012},
  url       = {https://doi.org/10.1007/978-3-642-29912-4\_12},
  doi       = {10.1007/978-3-642-29912-4\_12},
  timestamp = {Tue, 14 May 2019 10:00:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cosade/BayonBAFPRM12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/DehbaouiDRT12,
  author    = {Amine Dehbaoui and
               Jean{-}Max Dutertre and
               Bruno Robisson and
               Assia Tria},
  title     = {Electromagnetic Transient Faults Injection on a Hardware and a Software
               Implementations of {AES}},
  booktitle = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven,
               Belgium, September 9, 2012},
  pages     = {7--15},
  year      = {2012},
  crossref  = {DBLP:conf/fdtc/2012},
  url       = {https://doi.org/10.1109/FDTC.2012.15},
  doi       = {10.1109/FDTC.2012.15},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fdtc/DehbaouiDRT12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/LashermesRDFRT12,
  author    = {Ronan Lashermes and
               Guillaume Reymond and
               Jean{-}Max Dutertre and
               Jacques J. A. Fournier and
               Bruno Robisson and
               Assia Tria},
  title     = {A {DFA} on {AES} Based on the Entropy of Error Distributions},
  booktitle = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven,
               Belgium, September 9, 2012},
  pages     = {34--43},
  year      = {2012},
  crossref  = {DBLP:conf/fdtc/2012},
  url       = {https://doi.org/10.1109/FDTC.2012.18},
  doi       = {10.1109/FDTC.2012.18},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fdtc/LashermesRDFRT12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DehbaouiDROMT12,
  author    = {Amine Dehbaoui and
               Jean{-}Max Dutertre and
               Bruno Robisson and
               P. Orsatelli and
               Philippe Maurine and
               Assia Tria},
  title     = {Injection of transient faults using electromagnetic pulses -Practical
               results on a cryptographic system-},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {123},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/123},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DehbaouiDROMT12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijiei/FournierRBRTDA11,
  author    = {Jacques J. A. Fournier and
               Jean{-}Baptiste Rigaud and
               Sylvain Bouquet and
               Bruno Robisson and
               Assia Tria and
               Jean{-}Max Dutertre and
               Michel Agoyan},
  title     = {Design and characterisation of an {AES} chip embedding countermeasures},
  journal   = {{IJIEI}},
  volume    = {1},
  number    = {3/4},
  pages     = {328--347},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJIEI.2011.044101},
  doi       = {10.1504/IJIEI.2011.044101},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijiei/FournierRBRTDA11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/PoucheretTLCRM11,
  author    = {Fran{\c{c}}ois Poucheret and
               Karim Tobich and
               Mathieu Lisart and
               Laurent Chusseau and
               Bruno Robisson and
               Philippe Maurine},
  title     = {Local and Direct {EM} Injection of Power Into {CMOS} Integrated Circuits},
  booktitle = {2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
               2011, Tokyo, Japan, September 29, 2011},
  pages     = {100--104},
  year      = {2011},
  crossref  = {DBLP:conf/fdtc/2011},
  url       = {https://doi.org/10.1109/FDTC.2011.18},
  doi       = {10.1109/FDTC.2011.18},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fdtc/PoucheretTLCRM11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/HuuRAD11,
  author    = {Nguyen Minh Huu and
               Bruno Robisson and
               Michel Agoyan and
               Nathalie Drach},
  title     = {Low-cost recovery for the code integrity protection in secure embedded
               processors},
  booktitle = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium
               on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San
               Diego, California, {USA}},
  pages     = {99--104},
  year      = {2011},
  crossref  = {DBLP:conf/host/2011},
  url       = {https://doi.org/10.1109/HST.2011.5955004},
  doi       = {10.1109/HST.2011.5955004},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/host/HuuRAD11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isscc/Doulcier-VerdierDFRRT11,
  author    = {Marion Doulcier{-}Verdier and
               Jean{-}Max Dutertre and
               Jacques J. A. Fournier and
               Jean{-}Baptiste Rigaud and
               Bruno Robisson and
               Assia Tria},
  title     = {A side-channel and fault-attack resistant {AES} circuit working on
               duplicated complemented values},
  booktitle = {{IEEE} International Solid-State Circuits Conference, {ISSCC} 2011,
               Digest of Technical Papers, San Francisco, CA, USA, 20-24 February,
               2011},
  pages     = {274--276},
  year      = {2011},
  crossref  = {DBLP:conf/isscc/2011},
  url       = {https://doi.org/10.1109/ISSCC.2011.5746316},
  doi       = {10.1109/ISSCC.2011.5746316},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isscc/Doulcier-VerdierDFRRT11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/RobissonAHSPWB11,
  author    = {Bruno Robisson and
               Michel Agoyan and
               S{\'{e}}bastien Le Henaff and
               Patrick Soquet and
               Guillaume Phan and
               Franck Wajsb{\"{u}}rt and
               Pirouz Bazargan{-}Sabet},
  title     = {Implementation of Complex Strategies of Security Insecure Embedded
               Systems},
  booktitle = {4th {IFIP} International Conference on New Technologies, Mobility
               and Security, {NTMS} 2011, Paris, France, February 7-10, 2011},
  pages     = {1--5},
  year      = {2011},
  crossref  = {DBLP:conf/ntms/2011},
  url       = {https://doi.org/10.1109/NTMS.2011.5721145},
  doi       = {10.1109/NTMS.2011.5721145},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ntms/RobissonAHSPWB11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AboulkassimiAFFRT11,
  author    = {Driss Aboulkassimi and
               Michel Agoyan and
               Laurent Freund and
               Jacques J. A. Fournier and
               Bruno Robisson and
               Assia Tria},
  title     = {ElectroMagnetic analysis {(EMA)} of software {AES} on Java mobile
               phones},
  booktitle = {2011 {IEEE} International Workshop on Information Forensics and Security,
               {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages     = {1--6},
  year      = {2011},
  crossref  = {DBLP:conf/wifs/2011},
  url       = {https://doi.org/10.1109/WIFS.2011.6123131},
  doi       = {10.1109/WIFS.2011.6123131},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wifs/AboulkassimiAFFRT11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/AgoyanDNRT10,
  author    = {Michel Agoyan and
               Jean{-}Max Dutertre and
               David Naccache and
               Bruno Robisson and
               Assia Tria},
  title     = {When Clocks Fail: On Critical Paths and Clock Faults},
  booktitle = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2
               International Conference, {CARDIS} 2010, Passau, Germany, April 14-16,
               2010. Proceedings},
  pages     = {182--193},
  year      = {2010},
  crossref  = {DBLP:conf/cardis/2010},
  url       = {https://doi.org/10.1007/978-3-642-12510-2\_13},
  doi       = {10.1007/978-3-642-12510-2\_13},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cardis/AgoyanDNRT10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ddecs/HuuRAD10,
  author    = {Nguyen Minh Huu and
               Bruno Robisson and
               Michel Agoyan and
               Nathalie Drach},
  title     = {Low-cost fault tolerance on the {ALU} in simple pipelined processors},
  booktitle = {13th {IEEE} International Symposium on Design and Diagnostics of Electronic
               Circuits and Systems, {DDECS} 2010, Vienna, Austria, April 14-16,
               2010},
  pages     = {28--31},
  year      = {2010},
  crossref  = {DBLP:conf/ddecs/2010},
  url       = {https://doi.org/10.1109/DDECS.2010.5491822},
  doi       = {10.1109/DDECS.2010.5491822},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ddecs/HuuRAD10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RobissonM07,
  author    = {Bruno Robisson and
               Pascal Manet},
  title     = {Differential Behavioral Analysis},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
               Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  pages     = {413--426},
  year      = {2007},
  crossref  = {DBLP:conf/ches/2007},
  url       = {https://doi.org/10.1007/978-3-540-74735-2\_28},
  doi       = {10.1007/978-3-540-74735-2\_28},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ches/RobissonM07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LeCCRSL06,
  author    = {Thanh{-}Ha Le and
               Jessy Cl{\'{e}}di{\`{e}}re and
               C{\'{e}}cile Canovas and
               Bruno Robisson and
               Christine Servi{\`{e}}re and
               Jean{-}Louis Lacoume},
  title     = {A Proposition for Correlation Power Analysis Enhancement},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
               Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  pages     = {174--186},
  year      = {2006},
  crossref  = {DBLP:conf/ches/2006},
  url       = {https://doi.org/10.1007/11894063\_14},
  doi       = {10.1007/11894063\_14},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ches/LeCCRSL06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/recosoc/ManetRFJTRQL06,
  author    = {Pascal Manet and
               Jean{-}Baptiste Rigaud and
               Julien Francq and
               Marc Jeambrun and
               Assia Tria and
               Bruno Robisson and
               Jerome Quartana and
               Selma Laabidi},
  title     = {Integrated Evaluation Platform for Secured Devices},
  booktitle = {Proceedings of the 2nd International Workshop on Reconfigurable Communication-centric
               Systems-on-Chip, ReCoSoC 2006, Montpellier, France, July 2006},
  pages     = {214--219},
  year      = {2006},
  crossref  = {DBLP:conf/recosoc/2006},
  timestamp = {Mon, 13 Nov 2006 14:12:39 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/recosoc/ManetRFJTRQL06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Robisson01,
  author    = {Bruno Robisson},
  title     = {D{\'{e}}couverte automatique de circuits en {\'{e}}lectronique
               de puissance. (Automatic discovery of power electronic circuits)},
  school    = {Pierre and Marie Curie University, Paris, France},
  year      = {2001},
  url       = {https://tel.archives-ouvertes.fr/tel-00008279},
  timestamp = {Fri, 15 Jul 2016 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/phd/hal/Robisson01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/adhoc-now/2018,
  editor    = {Nicolas Montavont and
               Georgios Z. Papadopoulos},
  title     = {Ad-hoc, Mobile, and Wireless Networks - 17th International Conference
               on Ad Hoc Networks and Wireless, {ADHOC-NOW} 2018, Saint-Malo, France,
               September 5-7, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11104},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-00247-3},
  doi       = {10.1007/978-3-030-00247-3},
  isbn      = {978-3-030-00246-6},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/adhoc-now/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hipeac/2018cs,
  editor    = {John Goodacre and
               Mikel Luj{\'{a}}n and
               Giovanni Agosta and
               Alessandro Barenghi and
               Israel Koren and
               Gerardo Pelosi},
  title     = {Proceedings of the Fifth Workshop on Cryptography and Security in
               Computing Systems, {CS2} 2018, Manchester, United Kingdom, January
               24, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3178291},
  doi       = {10.1145/3178291},
  isbn      = {978-1-4503-6374-7},
  timestamp = {Tue, 18 Dec 2018 20:10:05 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hipeac/2018cs},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/K2018,
  editor    = {{\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Cyber-Physical Systems Security},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-98935-8},
  doi       = {10.1007/978-3-319-98935-8},
  isbn      = {978-3-319-98934-1},
  timestamp = {Fri, 08 Mar 2019 12:57:04 +0100},
  biburl    = {https://dblp.org/rec/bib/books/sp/K2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/arc/2016,
  editor    = {Vanderlei Bonato and
               Christos Bouganis and
               Marek Gorgon},
  title     = {Applied Reconfigurable Computing - 12th International Symposium, {ARC}
               2016, Mangaratiba, RJ, Brazil, March 22-24, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9625},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-30481-6},
  doi       = {10.1007/978-3-319-30481-6},
  isbn      = {978-3-319-30480-9},
  timestamp = {Tue, 14 May 2019 10:00:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/arc/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hipeac/2016cs,
  editor    = {Martin Palkovic and
               Giovanni Agosta and
               Alessandro Barenghi and
               Israel Koren and
               Gerardo Pelosi},
  title     = {Proceedings of the Third Workshop on Cryptography and Security in
               Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20,
               2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2858930},
  doi       = {10.1145/2858930},
  isbn      = {978-1-4503-4065-6},
  timestamp = {Tue, 06 Nov 2018 16:58:21 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hipeac/2016cs},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2016,
  editor    = {Sara Foresti and
               Javier L{\'{o}}pez},
  title     = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
               Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
               2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9895},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-45931-8},
  doi       = {10.1007/978-3-319-45931-8},
  isbn      = {978-3-319-45930-1},
  timestamp = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wistp/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/date/2015,
  editor    = {Wolfgang Nebel and
               David Atienza},
  title     = {Proceedings of the 2015 Design, Automation {\&} Test in Europe
               Conference {\&} Exhibition, {DATE} 2015, Grenoble, France, March
               9-13, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2755753},
  isbn      = {978-3-9815370-4-8},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/date/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dft/2015,
  title     = {2015 {IEEE} International Symposium on Defect and Fault Tolerance
               in {VLSI} and Nanotechnology Systems, {DFTS} 2015, Amherst, MA, USA,
               October 12-14, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7304347/proceeding},
  isbn      = {978-1-4799-8606-4},
  timestamp = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dft/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hipeac/2015cs,
  editor    = {Andy D. Pimentel and
               Stephan Wong and
               Gerardo Pelosi and
               Israel Koren and
               Giovanni Agosta and
               Alessandro Barenghi},
  title     = {Proceedings of the Second Workshop on Cryptography and Security in
               Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January
               19-21, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2694805},
  isbn      = {978-1-4503-3187-6},
  timestamp = {Sun, 25 Jan 2015 11:01:02 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hipeac/2015cs},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/host/2015,
  title     = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
               {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7119893/proceeding},
  isbn      = {978-1-4673-7420-0},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/host/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iolts/2015,
  title     = {21st {IEEE} International On-Line Testing Symposium, {IOLTS} 2015,
               Halkidiki, Greece, July 6-8, 2015},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7217973/proceeding},
  isbn      = {978-1-4673-7905-2},
  timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iolts/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/host/2014,
  title     = {2014 {IEEE} International Symposium on Hardware-Oriented Security
               and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6847848/proceeding},
  isbn      = {978-1-4799-4114-8},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/host/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2014,
  editor    = {Mohammad S. Obaidat and
               Andreas Holzinger and
               Pierangela Samarati},
  title     = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
               on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  publisher = {SciTePress},
  year      = {2014},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7504670/proceeding},
  isbn      = {978-989-758-045-1},
  timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vlsi/2014soc,
  editor    = {Lorena Garcia},
  title     = {22nd International Conference on Very Large Scale Integration, VLSI-SoC,
               Playa del Carmen, Mexico, October 6-8, 2014},
  publisher = {{IEEE}},
  year      = {2014},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6996506/proceeding},
  isbn      = {978-1-4799-6016-3},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/vlsi/2014soc},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdtc/2013,
  editor    = {Wieland Fischer and
               J{\"{o}}rn{-}Marc Schmidt},
  title     = {2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los
               Alamitos, CA, USA, August 20, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6621243/proceeding},
  isbn      = {978-0-7695-5059-6},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fdtc/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fps/2013,
  editor    = {Jean{-}Luc Danger and
               Mourad Debbabi and
               Jean{-}Yves Marion and
               Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               A. Nur Zincir{-}Heywood},
  title     = {Foundations and Practice of Security - 6th International Symposium,
               {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8352},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-05302-8},
  doi       = {10.1007/978-3-319-05302-8},
  isbn      = {978-3-319-05301-1},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fps/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/recosoc/2013,
  title     = {2013 8th International Workshop on Reconfigurable and Communication-Centric
               Systems-on-Chip (ReCoSoC), Darmstadt, Germany, July 10-12, 2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6575424/proceeding},
  isbn      = {978-1-4673-6180-4},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/recosoc/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cosade/2012,
  editor    = {Werner Schindler and
               Sorin A. Huss},
  title     = {Constructive Side-Channel Analysis and Secure Design - Third International
               Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7275},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-29912-4},
  doi       = {10.1007/978-3-642-29912-4},
  isbn      = {978-3-642-29911-7},
  timestamp = {Tue, 14 May 2019 10:00:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cosade/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdtc/2012,
  editor    = {Guido Bertoni and
               Benedikt Gierlichs},
  title     = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven,
               Belgium, September 9, 2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6305022/proceeding},
  isbn      = {978-1-4673-2900-2},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fdtc/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdtc/2011,
  editor    = {Luca Breveglieri and
               Sylvain Guilley and
               Israel Koren and
               David Naccache and
               Junko Takahashi},
  title     = {2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
               2011, Tokyo, Japan, September 29, 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6075045/proceeding},
  isbn      = {978-1-4577-1463-4},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fdtc/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/host/2011,
  title     = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium
               on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San
               Diego, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5946040/proceeding},
  isbn      = {978-1-4577-1059-9},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/host/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isscc/2011,
  title     = {{IEEE} International Solid-State Circuits Conference, {ISSCC} 2011,
               Digest of Technical Papers, San Francisco, CA, USA, 20-24 February,
               2011},
  publisher = {{IEEE}},
  year      = {2011},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5740653/proceeding},
  isbn      = {978-1-61284-303-2},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isscc/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ntms/2011,
  title     = {4th {IFIP} International Conference on New Technologies, Mobility
               and Security, {NTMS} 2011, Paris, France, February 7-10, 2011},
  publisher = {{IEEE}},
  year      = {2011},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5720565/proceeding},
  isbn      = {978-1-4244-8704-2},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ntms/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2011,
  title     = {2011 {IEEE} International Workshop on Information Forensics and Security,
               {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6112284/proceeding},
  isbn      = {978-1-4577-1017-9},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wifs/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cardis/2010,
  editor    = {Dieter Gollmann and
               Jean{-}Louis Lanet and
               Julien Iguchi{-}Cartigny},
  title     = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2
               International Conference, {CARDIS} 2010, Passau, Germany, April 14-16,
               2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6035},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-12510-2},
  doi       = {10.1007/978-3-642-12510-2},
  isbn      = {978-3-642-12509-6},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cardis/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ddecs/2010,
  editor    = {Elena Gramatov{\'{a}} and
               Zdenek Kot{\'{a}}sek and
               Andreas Steininger and
               Heinrich Theodor Vierhaus and
               Horst Zimmermann},
  title     = {13th {IEEE} International Symposium on Design and Diagnostics of Electronic
               Circuits and Systems, {DDECS} 2010, Vienna, Austria, April 14-16,
               2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5484099/proceeding},
  isbn      = {978-1-4244-6612-2},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ddecs/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2007,
  editor    = {Pascal Paillier and
               Ingrid Verbauwhede},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
               Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4727},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-74735-2},
  doi       = {10.1007/978-3-540-74735-2},
  isbn      = {978-3-540-74734-5},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ches/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2006,
  editor    = {Louis Goubin and
               Mitsuru Matsui},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
               Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4249},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11894063},
  doi       = {10.1007/11894063},
  isbn      = {3-540-46559-6},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ches/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/recosoc/2006,
  editor    = {Gilles Sassatelli and
               Leandro Soares Indrusiak and
               Manfred Glesner and
               Lionel Torres},
  title     = {Proceedings of the 2nd International Workshop on Reconfigurable Communication-centric
               Systems-on-Chip, ReCoSoC 2006, Montpellier, France, July 2006},
  publisher = {Univ. Montpellier {II}},
  year      = {2006},
  isbn      = {2-9517461-2-1},
  timestamp = {Mon, 13 Nov 2006 14:12:39 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/recosoc/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics