Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 34 matches
- 2017
- Zhe Liu, Patrick Longa, Geovandro C. C. F. Pereira, Oscar Reparaz, Hwajeong Seo:
Four \mathbb Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks. CHES 2017: 665-686 - Stéphanie Anceau, Pierre Bleuet, Jessy Clédière, Laurent Maingault, Jean-Luc Rainard, Rémi Tucoulou:
Nanofocused X-Ray Beam to Reprogram Secure Circuits. CHES 2017: 175-188 - Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo:
GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption. CHES 2017: 321-345 - Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom:
Sliding Right into Disaster: Left-to-Right Sliding Windows Leak. CHES 2017: 555-576 - Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier:
Gimli : A Cross-Platform Permutation. CHES 2017: 299-320 - Charlotte Bonte, Carl Bootland, Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren:
Faster Homomorphic Function Evaluation Using Non-integral Base Encoding. CHES 2017: 579-600 - Eleonora Cagli, Cécile Dumas, Emmanuel Prouff:
Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing. CHES 2017: 45-68 - Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi:
Blockcipher-Based Authenticated Encryption: How Small Can We Go? CHES 2017: 277-298 - Tung Chou:
McBits Revisited. CHES 2017: 213-231 - Marios O. Choudary, Pantelimon George Popescu:
Back to Massey: Impressively Fast, Scalable and Tight Security Evaluation Tools. CHES 2017: 367-386 - Christophe Clavier, Léo Reynaud:
Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of Leakages. CHES 2017: 24-44 - Jean-Sébastien Coron:
High-Order Conversion from Boolean to Arithmetic Masking. CHES 2017: 93-114 - Joan Daemen:
Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing. CHES 2017: 137-153 - Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud, Srinivas Vivek:
Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures. CHES 2017: 154-171 - Hannes Groß, Stefan Mangard:
Reconciling d+1 Masking in Hardware and Software. CHES 2017: 115-136 - Björn Haase, Benoît Labrique:
Making Password Authenticated Key Exchange Suitable for Resource-Constrained Industrial Control Devices. CHES 2017: 346-364 - Matthias Hiller, Aysun Gurur Önalan:
Hiding Secrecy Leakage in Leaky Helper Data. CHES 2017: 601-619 - Andreas Hülsing, Joost Rijneveld, John M. Schanck, Peter Schwabe:
High-Speed Key Encapsulation from NTRU. CHES 2017: 232-252 - Vincent Immler, Robert Specht, Florian Unterstein:
Your Rails Cannot Hide from Localized EM: How Dual-Rail Logic Fails on FPGAs. CHES 2017: 403-424 - Nisha Jacob, Johann Heyszl, Andreas Zankl, Carsten Rolfes, Georg Sigl:
How to Break Secure Boot on FPGA SoCs Through Malicious Hardware. CHES 2017: 425-442 - Jérémy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich:
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY. CHES 2017: 687-707 - Anthony Journault, François-Xavier Standaert:
Very High Order Masking: Efficient Implementation and Security Evaluation. CHES 2017: 623-643 - Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer, Srdjan Capkun:
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks. CHES 2017: 468-489 - Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth:
CacheZoom: How SGX Amplifies the Power of Cache Attacks. CHES 2017: 69-90 - Hildur Ólafsdóttir, Aanjhan Ranganathan, Srdjan Capkun:
On the Security of Carrier Phase-Based Ranging. CHES 2017: 490-509 - Romain Poussier, Yuanyuan Zhou, François-Xavier Standaert:
A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks. CHES 2017: 534-554 - Robert Primas, Peter Pessl, Stefan Mangard:
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption. CHES 2017: 513-533 - Tiago B. S. Reis, Diego F. Aranha, Julio César López-Hernández:
PRESENT Runs Fast - Efficient and Secure Implementation in Software. CHES 2017: 644-664 - Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede:
Fast Leakage Assessment. CHES 2017: 387-399 - Melissa Rossi, Mike Hamburg, Michael Hutter, Mark E. Marson:
A Side-Channel Assisted Cryptanalytic Attack Against QcBits. CHES 2017: 3-23
skipping 4 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-03 09:29 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint