Search dblp for Publications

export results for "toc:db/conf/hipeac/cs2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/hipeac/CarboneTMD15,
  author       = {Mathieu Carbone and
                  Yannick Teglia and
                  Philippe Maurine and
                  Gilles R. Ducharme},
  editor       = {Andy D. Pimentel and
                  Stephan Wong and
                  Gerardo Pelosi and
                  Israel Koren and
                  Giovanni Agosta and
                  Alessandro Barenghi},
  title        = {Interest of {MIA} in frequency domain?},
  booktitle    = {Proceedings of the Second Workshop on Cryptography and Security in
                  Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January
                  19-21, 2015},
  pages        = {35--38},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2694805.2694812},
  doi          = {10.1145/2694805.2694812},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hipeac/CarboneTMD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipeac/FournarisKSK15,
  author       = {Apostolos P. Fournaris and
                  Nicolaos Klaoudatos and
                  Nicolas Sklavos and
                  Christos Koulamas},
  editor       = {Andy D. Pimentel and
                  Stephan Wong and
                  Gerardo Pelosi and
                  Israel Koren and
                  Giovanni Agosta and
                  Alessandro Barenghi},
  title        = {Fault and Power Analysis Attack Resistant {RNS} based Edwards Curve
                  Point Multiplication},
  booktitle    = {Proceedings of the Second Workshop on Cryptography and Security in
                  Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January
                  19-21, 2015},
  pages        = {43--46},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2694805.2694814},
  doi          = {10.1145/2694805.2694814},
  timestamp    = {Fri, 15 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hipeac/FournarisKSK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipeac/HeH15,
  author       = {Wei He and
                  Alexander Herrmann},
  editor       = {Andy D. Pimentel and
                  Stephan Wong and
                  Gerardo Pelosi and
                  Israel Koren and
                  Giovanni Agosta and
                  Alessandro Barenghi},
  title        = {Placement Security Analysis for Side-Channel Resistant Dual-Rail Scheme
                  in {FPGA}},
  booktitle    = {Proceedings of the Second Workshop on Cryptography and Security in
                  Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January
                  19-21, 2015},
  pages        = {39--42},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2694805.2694813},
  doi          = {10.1145/2694805.2694813},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hipeac/HeH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipeac/HerrmannS15,
  author       = {Alexander Herrmann and
                  Marc St{\"{o}}ttinger},
  editor       = {Andy D. Pimentel and
                  Stephan Wong and
                  Gerardo Pelosi and
                  Israel Koren and
                  Giovanni Agosta and
                  Alessandro Barenghi},
  title        = {Evaluation Tools for Multivariate Side-Channel Analysis},
  booktitle    = {Proceedings of the Second Workshop on Cryptography and Security in
                  Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January
                  19-21, 2015},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2694805.2694806},
  doi          = {10.1145/2694805.2694806},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hipeac/HerrmannS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipeac/MartinsS15,
  author       = {Paulo Martins and
                  Leonel Sousa},
  editor       = {Andy D. Pimentel and
                  Stephan Wong and
                  Gerardo Pelosi and
                  Israel Koren and
                  Giovanni Agosta and
                  Alessandro Barenghi},
  title        = {Stretching the limits of Programmable Embedded Devices for Public-key
                  Cryptography},
  booktitle    = {Proceedings of the Second Workshop on Cryptography and Security in
                  Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January
                  19-21, 2015},
  pages        = {19--24},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2694805.2694809},
  doi          = {10.1145/2694805.2694809},
  timestamp    = {Wed, 16 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hipeac/MartinsS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipeac/MichailIV15,
  author       = {Harris E. Michail and
                  Lenos Ioannou and
                  Artemios G. Voyiatzis},
  editor       = {Andy D. Pimentel and
                  Stephan Wong and
                  Gerardo Pelosi and
                  Israel Koren and
                  Giovanni Agosta and
                  Alessandro Barenghi},
  title        = {Pipelined {SHA-3} Implementations on {FPGA:} Architecture and Performance
                  Analysis},
  booktitle    = {Proceedings of the Second Workshop on Cryptography and Security in
                  Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January
                  19-21, 2015},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2694805.2694808},
  doi          = {10.1145/2694805.2694808},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hipeac/MichailIV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipeac/PlagaM15,
  author       = {Rainer Plaga and
                  Dominik Merli},
  editor       = {Andy D. Pimentel and
                  Stephan Wong and
                  Gerardo Pelosi and
                  Israel Koren and
                  Giovanni Agosta and
                  Alessandro Barenghi},
  title        = {A new Definition and Classification of Physical Unclonable Functions},
  booktitle    = {Proceedings of the Second Workshop on Cryptography and Security in
                  Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January
                  19-21, 2015},
  pages        = {7--12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2694805.2694807},
  doi          = {10.1145/2694805.2694807},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hipeac/PlagaM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipeac/Toorani15,
  author       = {Mohsen Toorani},
  editor       = {Andy D. Pimentel and
                  Stephan Wong and
                  Gerardo Pelosi and
                  Israel Koren and
                  Giovanni Agosta and
                  Alessandro Barenghi},
  title        = {On Continuous After-the-Fact Leakage-Resilient Key Exchange},
  booktitle    = {Proceedings of the Second Workshop on Cryptography and Security in
                  Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January
                  19-21, 2015},
  pages        = {31--34},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2694805.2694811},
  doi          = {10.1145/2694805.2694811},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hipeac/Toorani15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipeac/ZussaEDRRTC15,
  author       = {Lo{\"{\i}}c Zussa and
                  Ingrid Exurville and
                  Jean{-}Max Dutertre and
                  Jean{-}Baptiste Rigaud and
                  Bruno Robisson and
                  Assia Tria and
                  Jessy Cl{\'{e}}di{\`{e}}re},
  editor       = {Andy D. Pimentel and
                  Stephan Wong and
                  Gerardo Pelosi and
                  Israel Koren and
                  Giovanni Agosta and
                  Alessandro Barenghi},
  title        = {Evidence of an information leakage between logically independent blocks},
  booktitle    = {Proceedings of the Second Workshop on Cryptography and Security in
                  Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January
                  19-21, 2015},
  pages        = {25--30},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2694805.2694810},
  doi          = {10.1145/2694805.2694810},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hipeac/ZussaEDRRTC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hipeac/2015cs,
  editor       = {Andy D. Pimentel and
                  Stephan Wong and
                  Gerardo Pelosi and
                  Israel Koren and
                  Giovanni Agosta and
                  Alessandro Barenghi},
  title        = {Proceedings of the Second Workshop on Cryptography and Security in
                  Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January
                  19-21, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2694805},
  isbn         = {978-1-4503-3187-6},
  timestamp    = {Sun, 25 Jan 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hipeac/2015cs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics