Stop the war!
Остановите войну!
for scientists:
default search action
3. CS2@HiPEAC 2016: Prague, Czech Republic
- Martin Palkovic, Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi:
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, Czech Republic, January 20, 2016. ACM 2016, ISBN 978-1-4503-4065-6 - Thierno Barry, Damien Couroussé, Bruno Robisson:
Compilation of a Countermeasure Against Instruction-Skip Fault Attacks. 1-6 - Hermann Seuschek, Johann Heyszl, Fabrizio De Santis:
A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes. 7-12 - Vincent Immler, Maxim Hennig, Ludwig Kürzinger, Georg Sigl:
Practical Aspects of Quantization and Tamper-Sensitivity for Physically Obfuscated Keys. 13-18 - Sandhya Koteshwara, Chris H. Kim, Keshab K. Parhi:
Mode-based Obfuscation using Control-Flow Modifications. 19-24 - Reza Azarderakhsh, Koray Karabina:
Efficient Algorithms and Architectures for Double Point Multiplication on Elliptic Curves. 25-30 - Ahmed Saeed, Ali Ahmadinia, Mike Just:
Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses. 31-36 - Karim M. Abdellatif, Roselyne Chotin-Avot, Habib Mehrez:
AEGIS-Based Efficient Solution for Secure Reconfiguration of FPGAs. 37-40 - Apostolos P. Fournaris, Nicolas Sklavos, Christos Koulamas:
A High Speed Scalar Multiplier for Binary Edwards Curves. 41-44 - Venu Nalla, Rajeev Anand Sahu, Vishal Saraswat:
Differential Fault Attack on SIMECK. 45-48 - Noemie Beringuier-Boher, Marc Lacruche, David El-Baze, Jean-Max Dutertre, Jean-Baptiste Rigaud, Philippe Maurine:
Body Biasing Injection Attacks in Practice. 49-54
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.