Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/hipeac/cs2015.bht:"
@inproceedings{DBLP:conf/hipeac/CarboneTMD15, author = {Mathieu Carbone and Yannick Teglia and Philippe Maurine and Gilles R. Ducharme}, editor = {Andy D. Pimentel and Stephan Wong and Gerardo Pelosi and Israel Koren and Giovanni Agosta and Alessandro Barenghi}, title = {Interest of {MIA} in frequency domain?}, booktitle = {Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015}, pages = {35--38}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2694805.2694812}, doi = {10.1145/2694805.2694812}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hipeac/CarboneTMD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hipeac/FournarisKSK15, author = {Apostolos P. Fournaris and Nicolaos Klaoudatos and Nicolas Sklavos and Christos Koulamas}, editor = {Andy D. Pimentel and Stephan Wong and Gerardo Pelosi and Israel Koren and Giovanni Agosta and Alessandro Barenghi}, title = {Fault and Power Analysis Attack Resistant {RNS} based Edwards Curve Point Multiplication}, booktitle = {Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015}, pages = {43--46}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2694805.2694814}, doi = {10.1145/2694805.2694814}, timestamp = {Fri, 15 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hipeac/FournarisKSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hipeac/HeH15, author = {Wei He and Alexander Herrmann}, editor = {Andy D. Pimentel and Stephan Wong and Gerardo Pelosi and Israel Koren and Giovanni Agosta and Alessandro Barenghi}, title = {Placement Security Analysis for Side-Channel Resistant Dual-Rail Scheme in {FPGA}}, booktitle = {Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015}, pages = {39--42}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2694805.2694813}, doi = {10.1145/2694805.2694813}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hipeac/HeH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hipeac/HerrmannS15, author = {Alexander Herrmann and Marc St{\"{o}}ttinger}, editor = {Andy D. Pimentel and Stephan Wong and Gerardo Pelosi and Israel Koren and Giovanni Agosta and Alessandro Barenghi}, title = {Evaluation Tools for Multivariate Side-Channel Analysis}, booktitle = {Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015}, pages = {1--6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2694805.2694806}, doi = {10.1145/2694805.2694806}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hipeac/HerrmannS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hipeac/MartinsS15, author = {Paulo Martins and Leonel Sousa}, editor = {Andy D. Pimentel and Stephan Wong and Gerardo Pelosi and Israel Koren and Giovanni Agosta and Alessandro Barenghi}, title = {Stretching the limits of Programmable Embedded Devices for Public-key Cryptography}, booktitle = {Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015}, pages = {19--24}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2694805.2694809}, doi = {10.1145/2694805.2694809}, timestamp = {Wed, 16 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hipeac/MartinsS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hipeac/MichailIV15, author = {Harris E. Michail and Lenos Ioannou and Artemios G. Voyiatzis}, editor = {Andy D. Pimentel and Stephan Wong and Gerardo Pelosi and Israel Koren and Giovanni Agosta and Alessandro Barenghi}, title = {Pipelined {SHA-3} Implementations on {FPGA:} Architecture and Performance Analysis}, booktitle = {Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015}, pages = {13--18}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2694805.2694808}, doi = {10.1145/2694805.2694808}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hipeac/MichailIV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hipeac/PlagaM15, author = {Rainer Plaga and Dominik Merli}, editor = {Andy D. Pimentel and Stephan Wong and Gerardo Pelosi and Israel Koren and Giovanni Agosta and Alessandro Barenghi}, title = {A new Definition and Classification of Physical Unclonable Functions}, booktitle = {Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015}, pages = {7--12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2694805.2694807}, doi = {10.1145/2694805.2694807}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hipeac/PlagaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hipeac/Toorani15, author = {Mohsen Toorani}, editor = {Andy D. Pimentel and Stephan Wong and Gerardo Pelosi and Israel Koren and Giovanni Agosta and Alessandro Barenghi}, title = {On Continuous After-the-Fact Leakage-Resilient Key Exchange}, booktitle = {Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015}, pages = {31--34}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2694805.2694811}, doi = {10.1145/2694805.2694811}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hipeac/Toorani15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hipeac/ZussaEDRRTC15, author = {Lo{\"{\i}}c Zussa and Ingrid Exurville and Jean{-}Max Dutertre and Jean{-}Baptiste Rigaud and Bruno Robisson and Assia Tria and Jessy Cl{\'{e}}di{\`{e}}re}, editor = {Andy D. Pimentel and Stephan Wong and Gerardo Pelosi and Israel Koren and Giovanni Agosta and Alessandro Barenghi}, title = {Evidence of an information leakage between logically independent blocks}, booktitle = {Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015}, pages = {25--30}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2694805.2694810}, doi = {10.1145/2694805.2694810}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hipeac/ZussaEDRRTC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/hipeac/2015cs, editor = {Andy D. Pimentel and Stephan Wong and Gerardo Pelosi and Israel Koren and Giovanni Agosta and Alessandro Barenghi}, title = {Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2694805}, isbn = {978-1-4503-3187-6}, timestamp = {Sun, 25 Jan 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hipeac/2015cs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.