BibTeX records: Stefan Mangard

download as .bib file

@article{DBLP:journals/tches/GigerlKMMP24,
  author       = {Barbara Gigerl and
                  Franz Klug and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  title        = {Smooth Passage with the Guards: Second-Order Hardware Masking of the
                  {AES} with Low Randomness and Low Latency},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {309--335},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.309-335},
  doi          = {10.46586/TCHES.V2024.I1.309-335},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/GigerlKMMP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HadzicCPMB24,
  author       = {Vedad Hadzic and
                  Ga{\"{e}}tan Cassiers and
                  Robert Primas and
                  Stefan Mangard and
                  Roderick Bloem},
  title        = {Quantile: Quantifying Information Leakage},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {433--456},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.433-456},
  doi          = {10.46586/TCHES.V2024.I1.433-456},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/HadzicCPMB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TollecHNABCHJM24,
  author       = {Simon Tollec and
                  Vedad Hadzic and
                  Pascal Nasahl and
                  Mihail Asavoae and
                  Roderick Bloem and
                  Damien Courouss{\'{e}} and
                  Karine Heydemann and
                  Mathieu Jan and
                  Stefan Mangard},
  title        = {Fault-Resistant Partitioning of Secure CPUs for System Co-Verification
                  against Faults},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {247},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/247},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/TollecHNABCHJM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GigerlPM23,
  author       = {Barbara Gigerl and
                  Robert Primas and
                  Stefan Mangard},
  editor       = {Mehdi Tibouchi and
                  Xiaofeng Wang},
  title        = {Formal Verification of Arithmetic Masking in Hardware and Software},
  booktitle    = {Applied Cryptography and Network Security - 21st International Conference,
                  {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13905},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33488-7\_1},
  doi          = {10.1007/978-3-031-33488-7\_1},
  timestamp    = {Fri, 02 Jun 2023 14:41:32 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GigerlPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MaarSRGM23,
  author       = {Lukas Maar and
                  Martin Schwarzl and
                  Fabian Rauscher and
                  Daniel Gruss and
                  Stefan Mangard},
  title        = {{DOPE:} DOmain Protection Enforcement with {PKS}},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {662--676},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627113},
  doi          = {10.1145/3627106.3627113},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MaarSRGM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/Unterguggenberger23,
  author       = {Martin Unterguggenberger and
                  David Schrammel and
                  Pascal Nasahl and
                  Robert Schilling and
                  Lukas Lamster and
                  Stefan Mangard},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {Multi-Tag: {A} Hardware-Software Co-Design for Memory Safety based
                  on Multi-Granular Memory Tagging},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {177--189},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3590331},
  doi          = {10.1145/3579856.3590331},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/Unterguggenberger23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/SchrammelWLUM23,
  author       = {David Schrammel and
                  Moritz Waser and
                  Lukas Lamster and
                  Martin Unterguggenberger and
                  Stefan Mangard},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {{SPEAR-V:} Secure and Practical Enclave Architecture for {RISC-V}},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {457--468},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3595784},
  doi          = {10.1145/3579856.3595784},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/SchrammelWLUM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/GigerlPM23,
  author       = {Barbara Gigerl and
                  Robert Primas and
                  Stefan Mangard},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {Secure Context Switching of Masked Software Implementations},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {980--992},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3595798},
  doi          = {10.1145/3579856.3595798},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/GigerlPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Unterguggenberger23,
  author       = {Martin Unterguggenberger and
                  David Schrammel and
                  Lukas Lamster and
                  Pascal Nasahl and
                  Stefan Mangard},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Cryptographically Enforced Memory Safety},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {889--903},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623138},
  doi          = {10.1145/3576915.3623138},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Unterguggenberger23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/NasahlUNSSM23,
  author       = {Pascal Nasahl and
                  Martin Unterguggenberger and
                  Rishub Nagpal and
                  Robert Schilling and
                  David Schrammel and
                  Stefan Mangard},
  title        = {{SCFI:} State Machine Control-Flow Hardening Against Fault Attacks},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2023, Antwerp, Belgium, April 17-19, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.23919/DATE56975.2023.10137038},
  doi          = {10.23919/DATE56975.2023.10137038},
  timestamp    = {Wed, 07 Jun 2023 22:08:03 +0200},
  biburl       = {https://dblp.org/rec/conf/date/NasahlUNSSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/NasahlM23,
  author       = {Pascal Nasahl and
                  Stefan Mangard},
  editor       = {Himanshu Thapliyal and
                  Ronald F. DeMara and
                  Inna Partin{-}Vaisband and
                  Srinivas Katkoori},
  title        = {{SCRAMBLE-CFI:} Mitigating Fault-Induced Control-Flow Attacks on OpenTitan},
  booktitle    = {Proceedings of the Great Lakes Symposium on {VLSI} 2023, {GLSVLSI}
                  2023, Knoxville, TN, USA, June 5-7, 2023},
  pages        = {45--50},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3583781.3590221},
  doi          = {10.1145/3583781.3590221},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/NasahlM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/NasahlSLGLDSM23,
  author       = {Pascal Nasahl and
                  Salmin Sultana and
                  Hans Liljestrand and
                  Karanvir Grewal and
                  Michael LeMay and
                  David M. Durham and
                  David Schrammel and
                  Stefan Mangard},
  title        = {{EC-CFI:} Control-Flow Integrity via Code Encryption Counteracting
                  Fault Attacks},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2023, San Jose, CA, USA, May 1-4, 2023},
  pages        = {24--35},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/HOST55118.2023.10132915},
  doi          = {10.1109/HOST55118.2023.10132915},
  timestamp    = {Mon, 11 Sep 2023 17:53:23 +0200},
  biburl       = {https://dblp.org/rec/conf/host/NasahlSLGLDSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SchrammelSGLDUN23,
  author       = {David Schrammel and
                  Salmin Sultana and
                  Karanvir Grewal and
                  Michael LeMay and
                  David M. Durham and
                  Martin Unterguggenberger and
                  Pascal Nasahl and
                  Stefan Mangard},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{MEMES:} Memory Encryption-Based Memory Safety on Commodity Hardware},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {25--36},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012050300003555},
  doi          = {10.5220/0012050300003555},
  timestamp    = {Mon, 31 Jul 2023 15:34:21 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SchrammelSGLDUN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GinerSPEUMG23,
  author       = {Lukas Giner and
                  Stefan Steinegger and
                  Antoon Purnal and
                  Maria Eichlseder and
                  Thomas Unterluggauer and
                  Stefan Mangard and
                  Daniel Gruss},
  title        = {Scatter and Split Securely: Defeating Cache Contention and Occupancy
                  Attacks},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {2273--2287},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179440},
  doi          = {10.1109/SP46215.2023.10179440},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GinerSPEUMG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LamsterUSM23,
  author       = {Lukas Lamster and
                  Martin Unterguggenberger and
                  David Schrammel and
                  Stefan Mangard},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {HashTag: Hash-based Integrity Protection for Tagged Architectures},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {2797--2814},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/lamster},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LamsterUSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KoglerJG0S0GM23,
  author       = {Andreas Kogler and
                  Jonas Juffinger and
                  Lukas Giner and
                  Lukas Gerlach and
                  Martin Schwarzl and
                  Michael Schwarz and
                  Daniel Gruss and
                  Stefan Mangard},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Collide+Power: Leaking Inaccessible Data with Software-based Power
                  Side Channels},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {7285--7302},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/kogler},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KoglerJG0S0GM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-02915,
  author       = {Robert Schilling and
                  Pascal Nasahl and
                  Martin Unterguggenberger and
                  Stefan Mangard},
  title        = {{SFP:} Providing System Call Flow Protection against Software and
                  Fault Attacks},
  journal      = {CoRR},
  volume       = {abs/2301.02915},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.02915},
  doi          = {10.48550/ARXIV.2301.02915},
  eprinttype    = {arXiv},
  eprint       = {2301.02915},
  timestamp    = {Tue, 10 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-02915.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-13760,
  author       = {Pascal Nasahl and
                  Salmin Sultana and
                  Hans Liljestrand and
                  Karanvir Grewal and
                  Michael LeMay and
                  David M. Durham and
                  David Schrammel and
                  Stefan Mangard},
  title        = {{EC-CFI:} Control-Flow Integrity via Code Encryption Counteracting
                  Fault Attacks},
  journal      = {CoRR},
  volume       = {abs/2301.13760},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.13760},
  doi          = {10.48550/ARXIV.2301.13760},
  eprinttype    = {arXiv},
  eprint       = {2301.13760},
  timestamp    = {Thu, 02 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-13760.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-03711,
  author       = {Pascal Nasahl and
                  Stefan Mangard},
  title        = {{SCRAMBLE-CFI:} Mitigating Fault-Induced Control-Flow Attacks on OpenTitan},
  journal      = {CoRR},
  volume       = {abs/2303.03711},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.03711},
  doi          = {10.48550/ARXIV.2303.03711},
  eprinttype    = {arXiv},
  eprint       = {2303.03711},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-03711.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GigerlPM23,
  author       = {Barbara Gigerl and
                  Robert Primas and
                  Stefan Mangard},
  title        = {Secure Context Switching of Masked Software Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {677},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/677},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GigerlPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CassiersGMMN23,
  author       = {Ga{\"{e}}tan Cassiers and
                  Barbara Gigerl and
                  Stefan Mangard and
                  Charles Momin and
                  Rishub Nagpal},
  title        = {Compress: Reducing Area and Latency of Masked Pipelined Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1600},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1600},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CassiersGMMN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/NasahlOVSTRM22,
  author       = {Pascal Nasahl and
                  Miguel Osorio and
                  Pirmin Vogel and
                  Michael Schaffner and
                  Timothy Trippel and
                  Dominic Rizzo and
                  Stefan Mangard},
  title        = {{SYNFI:} Pre-Silicon Fault Analysis of an Open-Source Secure Element},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {56--87},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.56-87},
  doi          = {10.46586/TCHES.V2022.I4.56-87},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/NasahlOVSTRM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/NagpalGPM22,
  author       = {Rishub Nagpal and
                  Barbara Gigerl and
                  Robert Primas and
                  Stefan Mangard},
  title        = {Riding the Waves Towards Generic Single-Cycle Masking in Hardware},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {693--717},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.693-717},
  doi          = {10.46586/TCHES.V2022.I4.693-717},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/NagpalGPM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BloemGGHMP22,
  author       = {Roderick Bloem and
                  Barbara Gigerl and
                  Marc Gourjon and
                  Vedad Hadzic and
                  Stefan Mangard and
                  Robert Primas},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Power Contracts: Provably Complete Power Leakage Models for Processors},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {381--395},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560600},
  doi          = {10.1145/3548606.3560600},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BloemGGHMP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/SchillingNM22,
  author       = {Robert Schilling and
                  Pascal Nasahl and
                  Stefan Mangard},
  editor       = {Josep Balasch and
                  Colin O'Flynn},
  title        = {{FIPAC:} Thwarting Fault- and Software-Induced Control-Flow Attacks
                  with {ARM} Pointer Authentication},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 13th International
                  Workshop, {COSADE} 2022, Leuven, Belgium, April 11-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13211},
  pages        = {100--124},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-99766-3\_5},
  doi          = {10.1007/978-3-030-99766-3\_5},
  timestamp    = {Fri, 01 Apr 2022 15:49:26 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/SchillingNM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/SchillingNUM22,
  author       = {Robert Schilling and
                  Pascal Nasahl and
                  Martin Unterguggenberger and
                  Stefan Mangard},
  title        = {{SFP:} Providing System Call Flow Protection against Software and
                  Fault Attacks},
  booktitle    = {Proceedings of the 11th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1
                  October 2022},
  pages        = {18--26},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3569562.3569565},
  doi          = {10.1145/3569562.3569565},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hasp/SchillingNUM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SchrammelWSM22,
  author       = {David Schrammel and
                  Samuel Weiser and
                  Richard Sadek and
                  Stefan Mangard},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Jenny: Securing Syscalls for PKU-based Memory Isolation Systems},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {936--952},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/schrammel},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SchrammelWSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-04775,
  author       = {Pascal Nasahl and
                  Miguel Osorio and
                  Pirmin Vogel and
                  Michael Schaffner and
                  Timothy Trippel and
                  Dominic Rizzo and
                  Stefan Mangard},
  title        = {{SYNFI:} Pre-Silicon Fault Analysis of an Open-Source Secure Element},
  journal      = {CoRR},
  volume       = {abs/2205.04775},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.04775},
  doi          = {10.48550/ARXIV.2205.04775},
  eprinttype    = {arXiv},
  eprint       = {2205.04775},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-04775.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-01356,
  author       = {Pascal Nasahl and
                  Martin Unterguggenberger and
                  Rishub Nagpal and
                  Robert Schilling and
                  David Schrammel and
                  Stefan Mangard},
  title        = {{SCFI:} State Machine Control-Flow Hardening Against Fault Attacks},
  journal      = {CoRR},
  volume       = {abs/2208.01356},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.01356},
  doi          = {10.48550/ARXIV.2208.01356},
  eprinttype    = {arXiv},
  eprint       = {2208.01356},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-01356.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NagpalGPM22,
  author       = {Rishub Nagpal and
                  Barbara Gigerl and
                  Robert Primas and
                  Stefan Mangard},
  title        = {Riding the Waves Towards Generic Single-Cycle Masking in Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {505},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/505},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NagpalGPM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BloemGGHMP22,
  author       = {Roderick Bloem and
                  Barbara Gigerl and
                  Marc Gourjon and
                  Vedad Hadzic and
                  Stefan Mangard and
                  Robert Primas},
  title        = {Power Contracts: Provably Complete Power Leakage Models for Processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {565},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/565},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BloemGGHMP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GigerlPM22,
  author       = {Barbara Gigerl and
                  Robert Primas and
                  Stefan Mangard},
  title        = {Formal Verification of Arithmetic Masking in Hardware and Software},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {849},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/849},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GigerlPM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/NasahlSWM21,
  author       = {Pascal Nasahl and
                  Robert Schilling and
                  Mario Werner and
                  Stefan Mangard},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {{HECTOR-V:} {A} Heterogeneous {CPU} Architecture for a Secure {RISC-V}
                  Execution Environment},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {187--199},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3453112},
  doi          = {10.1145/3433210.3453112},
  timestamp    = {Wed, 09 Jun 2021 15:14:39 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/NasahlSWM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/NasahlSWHMM21,
  author       = {Pascal Nasahl and
                  Robert Schilling and
                  Mario Werner and
                  Jan Hoogerbrugge and
                  Marcel Medwed and
                  Stefan Mangard},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using
                  Cryptographically Colored Memory},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {200--212},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3453684},
  doi          = {10.1145/3433210.3453684},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/NasahlSWHMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GigerlPM21,
  author       = {Barbara Gigerl and
                  Robert Primas and
                  Stefan Mangard},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Secure and Efficient Software Masking on Superscalar Pipelined Processors},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13091},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92075-3\_1},
  doi          = {10.1007/978-3-030-92075-3\_1},
  timestamp    = {Fri, 03 Dec 2021 17:36:49 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GigerlPM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SteineggerSWNM21,
  author       = {Stefan Steinegger and
                  David Schrammel and
                  Samuel Weiser and
                  Pascal Nasahl and
                  Stefan Mangard},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {SERVAS! Secure Enclaves via {RISC-V} Authenticryption Shield},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12973},
  pages        = {370--391},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88428-4\_19},
  doi          = {10.1007/978-3-030-88428-4\_19},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SteineggerSWNM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/SchillingNWM21,
  author       = {Robert Schilling and
                  Pascal Nasahl and
                  Stefan Weiglhofer and
                  Stefan Mangard},
  title        = {SecWalk: Protecting Page Table Walks Against Fault Attacks},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2021, Tysons Corner, VA, USA, December 12-15, 2021},
  pages        = {56--67},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/HOST49136.2021.9702269},
  doi          = {10.1109/HOST49136.2021.9702269},
  timestamp    = {Mon, 21 Feb 2022 19:10:15 +0100},
  biburl       = {https://dblp.org/rec/conf/host/SchillingNWM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/NasahlSM21,
  author       = {Pascal Nasahl and
                  Robert Schilling and
                  Stefan Mangard},
  title        = {Protecting Indirect Branches Against Fault Attacks Using {ARM} Pointer
                  Authentication},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2021, Tysons Corner, VA, USA, December 12-15, 2021},
  pages        = {68--79},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/HOST49136.2021.9702268},
  doi          = {10.1109/HOST49136.2021.9702268},
  timestamp    = {Mon, 21 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/NasahlSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GigerlHPMB21,
  author       = {Barbara Gigerl and
                  Vedad Hadzic and
                  Robert Primas and
                  Stefan Mangard and
                  Roderick Bloem},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Coco: Co-Design and Co-Verification of Masked Software Implementations
                  on CPUs},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1469--1468},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/gigerl},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GigerlHPMB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-14993,
  author       = {Robert Schilling and
                  Pascal Nasahl and
                  Stefan Mangard},
  title        = {{FIPAC:} Thwarting Fault- and Software-Induced Control-Flow Attacks
                  with {ARM} Pointer Authentication},
  journal      = {CoRR},
  volume       = {abs/2104.14993},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.14993},
  eprinttype    = {arXiv},
  eprint       = {2104.14993},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-14993.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-03395,
  author       = {Stefan Steinegger and
                  David Schrammel and
                  Samuel Weiser and
                  Pascal Nasahl and
                  Stefan Mangard},
  title        = {SERVAS! Secure Enclaves via {RISC-V} Authenticryption Shield},
  journal      = {CoRR},
  volume       = {abs/2105.03395},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.03395},
  eprinttype    = {arXiv},
  eprint       = {2105.03395},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-03395.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GigerlPM21,
  author       = {Barbara Gigerl and
                  Robert Primas and
                  Stefan Mangard},
  title        = {Secure and Efficient Software Masking on Superscalar Pipelined Processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1110},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1110},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GigerlPM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/LippSGPHHMKGYHS20,
  author       = {Moritz Lipp and
                  Michael Schwarz and
                  Daniel Gruss and
                  Thomas Prescher and
                  Werner Haas and
                  Jann Horn and
                  Stefan Mangard and
                  Paul Kocher and
                  Daniel Genkin and
                  Yuval Yarom and
                  Mike Hamburg and
                  Raoul Strackx},
  title        = {Meltdown: reading kernel memory from user space},
  journal      = {Commun. {ACM}},
  volume       = {63},
  number       = {6},
  pages        = {46--56},
  year         = {2020},
  url          = {https://doi.org/10.1145/3357033},
  doi          = {10.1145/3357033},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/LippSGPHHMKGYHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/KocherHFGGHHLMP20,
  author       = {Paul Kocher and
                  Jann Horn and
                  Anders Fogh and
                  Daniel Genkin and
                  Daniel Gruss and
                  Werner Haas and
                  Mike Hamburg and
                  Moritz Lipp and
                  Stefan Mangard and
                  Thomas Prescher and
                  Michael Schwarz and
                  Yuval Yarom},
  title        = {Spectre attacks: exploiting speculative execution},
  journal      = {Commun. {ACM}},
  volume       = {63},
  number       = {7},
  pages        = {93--101},
  year         = {2020},
  url          = {https://doi.org/10.1145/3399742},
  doi          = {10.1145/3399742},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/KocherHFGGHHLMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersec/SchwarzWGMM20,
  author       = {Michael Schwarz and
                  Samuel Weiser and
                  Daniel Gruss and
                  Cl{\'{e}}mentine Maurice and
                  Stefan Mangard},
  title        = {Malware Guard Extension: abusing Intel {SGX} to conceal cache attacks},
  journal      = {Cybersecur.},
  volume       = {3},
  number       = {1},
  pages        = {2},
  year         = {2020},
  url          = {https://doi.org/10.1186/s42400-019-0042-y},
  doi          = {10.1186/S42400-019-0042-Y},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersec/SchwarzWGMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DobraunigEMMMPU20,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Stefan Mangard and
                  Florian Mendel and
                  Bart Mennink and
                  Robert Primas and
                  Thomas Unterluggauer},
  title        = {Isap v2.0},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {390--416},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.390-416},
  doi          = {10.13154/TOSC.V2020.IS1.390-416},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DobraunigEMMMPU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SchrammelWSS0MG20,
  author       = {David Schrammel and
                  Samuel Weiser and
                  Stefan Steinegger and
                  Martin Schwarzl and
                  Michael Schwarz and
                  Stefan Mangard and
                  Daniel Gruss},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {Donky: Domain Keys - Efficient In-Process Isolation for {RISC-V} and
                  x86},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {1677--1694},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/schrammel},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SchrammelWSS0MG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-05262,
  author       = {Pascal Nasahl and
                  Robert Schilling and
                  Mario Werner and
                  Stefan Mangard},
  title        = {{HECTOR-V:} {A} Heterogeneous {CPU} Architecture for a Secure {RISC-V}
                  Execution Environment},
  journal      = {CoRR},
  volume       = {abs/2009.05262},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.05262},
  eprinttype    = {arXiv},
  eprint       = {2009.05262},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-05262.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-06761,
  author       = {Pascal Nasahl and
                  Robert Schilling and
                  Mario Werner and
                  Jan Hoogerbrugge and
                  Marcel Medwed and
                  Stefan Mangard},
  title        = {CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using
                  Cryptographically Colored Memory},
  journal      = {CoRR},
  volume       = {abs/2012.06761},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.06761},
  eprinttype    = {arXiv},
  eprint       = {2012.06761},
  timestamp    = {Sat, 02 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-06761.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GigerlHPMB20,
  author       = {Barbara Gigerl and
                  Vedad Hadzic and
                  Robert Primas and
                  Stefan Mangard and
                  Roderick Bloem},
  title        = {Coco: Co-Design and Co-Verification of Masked Software Implementations
                  on CPUs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1294},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1294},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GigerlHPMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/UnterluggauerWM19,
  author       = {Thomas Unterluggauer and
                  Mario Werner and
                  Stefan Mangard},
  title        = {{MEAS:} memory encryption and authentication secure against side-channel
                  attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {2},
  pages        = {137--158},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0180-2},
  doi          = {10.1007/S13389-018-0180-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/UnterluggauerWM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GrossSMKM19,
  author       = {Hannes Gro{\ss} and
                  Ko Stoffelen and
                  Lauren De Meyer and
                  Martin Krenn and
                  Stefan Mangard},
  editor       = {Beg{\"{u}}l Bilgin and
                  Svetla Petkova{-}Nikova and
                  Vincent Rijmen},
  title        = {First-Order Masking with Only Two Random Bits},
  booktitle    = {Proceedings of {ACM} Workshop on Theory of Implementation Security,
                  TIS@CCS 2019, London, UK, November 11, 2019},
  pages        = {10--23},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338467.3358950},
  doi          = {10.1145/3338467.3358950},
  timestamp    = {Sat, 30 Sep 2023 09:36:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GrossSMKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/WernerSUM19,
  author       = {Mario Werner and
                  Robert Schilling and
                  Thomas Unterluggauer and
                  Stefan Mangard},
  editor       = {J{\"{u}}rgen Teich and
                  Franco Fummi},
  title        = {Protecting {RISC-V} Processors against Physical Attacks},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2019, Florence, Italy, March 25-29, 2019},
  pages        = {1136--1141},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.23919/DATE.2019.8714811},
  doi          = {10.23919/DATE.2019.8714811},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/date/WernerSUM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WeiserWBMMS19,
  author       = {Samuel Weiser and
                  Mario Werner and
                  Ferdinand Brasser and
                  Maja Malenko and
                  Stefan Mangard and
                  Ahmad{-}Reza Sadeghi},
  title        = {{TIMBER-V:} Tag-Isolated Memory Bringing Fine-grained Enclaves to
                  {RISC-V}},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/timber-v-tag-isolated-memory-bringing-fine-grained-enclaves-to-risc-v/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WeiserWBMMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KocherHFGGHHLM019,
  author       = {Paul Kocher and
                  Jann Horn and
                  Anders Fogh and
                  Daniel Genkin and
                  Daniel Gruss and
                  Werner Haas and
                  Mike Hamburg and
                  Moritz Lipp and
                  Stefan Mangard and
                  Thomas Prescher and
                  Michael Schwarz and
                  Yuval Yarom},
  title        = {Spectre Attacks: Exploiting Speculative Execution},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {1--19},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00002},
  doi          = {10.1109/SP.2019.00002},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KocherHFGGHHLM019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WernerUG0GM19,
  author       = {Mario Werner and
                  Thomas Unterluggauer and
                  Lukas Giner and
                  Michael Schwarz and
                  Daniel Gruss and
                  Stefan Mangard},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {ScatterCache: Thwarting Cache Attacks via Cache Set Randomization},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {675--692},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/werner},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WernerUG0GM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vmcai/KarlSBM19,
  author       = {Anja F. Karl and
                  Robert Schilling and
                  Roderick Bloem and
                  Stefan Mangard},
  editor       = {Constantin Enea and
                  Ruzica Piskac},
  title        = {Small Faults Grow Up - Verification of Error Masking Robustness in
                  Arithmetically Encoded Programs},
  booktitle    = {Verification, Model Checking, and Abstract Interpretation - 20th International
                  Conference, {VMCAI} 2019, Cascais, Portugal, January 13-15, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11388},
  pages        = {183--204},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-11245-5\_9},
  doi          = {10.1007/978-3-030-11245-5\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vmcai/KarlSBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/SpreitzerMKM18,
  author       = {Raphael Spreitzer and
                  Veelasha Moonsamy and
                  Thomas Korak and
                  Stefan Mangard},
  title        = {Systematic Classification of Side-Channel Attacks: {A} Case Study
                  for Mobile Devices},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {20},
  number       = {1},
  pages        = {465--488},
  year         = {2018},
  url          = {https://doi.org/10.1109/COMST.2017.2779824},
  doi          = {10.1109/COMST.2017.2779824},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/SpreitzerMKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GrossM18,
  author       = {Hannes Gro{\ss} and
                  Stefan Mangard},
  title        = {A unified masking approach},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {2},
  pages        = {109--124},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-018-0184-y},
  doi          = {10.1007/S13389-018-0184-Y},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GrossM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DobraunigEKMMP18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Thomas Korak and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  title        = {{SIFA:} Exploiting Ineffective Fault Inductions on Symmetric Cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {547--572},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.547-572},
  doi          = {10.13154/TCHES.V2018.I3.547-572},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/DobraunigEKMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchillingWNM18,
  author       = {Robert Schilling and
                  Mario Werner and
                  Pascal Nasahl and
                  Stefan Mangard},
  title        = {Pointing in the Right Direction - Securing Memory Accesses in a Faulty
                  World},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {595--604},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274728},
  doi          = {10.1145/3274694.3274728},
  timestamp    = {Wed, 05 Dec 2018 09:44:25 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchillingWNM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DobraunigEGMMP18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Hannes Gro{\ss} and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Statistical Ineffective Fault Attacks on Masked {AES} with Fault Countermeasures},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11273},
  pages        = {315--342},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03329-3\_11},
  doi          = {10.1007/978-3-030-03329-3\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DobraunigEGMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001GLMSFM18,
  author       = {Michael Schwarz and
                  Daniel Gruss and
                  Moritz Lipp and
                  Cl{\'{e}}mentine Maurice and
                  Thomas Schuster and
                  Anders Fogh and
                  Stefan Mangard},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Automated Detection, Exploitation, and Elimination of Double-Fetch
                  Bugs using Modern {CPU} Features},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {587--600},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196508},
  doi          = {10.1145/3196494.3196508},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0001GLMSFM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SpreitzerKGM18,
  author       = {Raphael Spreitzer and
                  Felix Kirchengast and
                  Daniel Gruss and
                  Stefan Mangard},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks
                  on Android},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {749--763},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196510},
  doi          = {10.1145/3196494.3196510},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SpreitzerKGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/SchillingUMGMB18,
  author       = {Robert Schilling and
                  Thomas Unterluggauer and
                  Stefan Mangard and
                  Frank K. G{\"{u}}rkaynak and
                  Michael Muehlberghuber and
                  Luca Benini},
  editor       = {Jan Madsen and
                  Ayse K. Coskun},
  title        = {High speed {ASIC} implementations of leakage-resilient cryptography},
  booktitle    = {2018 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2018, Dresden, Germany, March 19-23, 2018},
  pages        = {1259--1264},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/DATE.2018.8342208},
  doi          = {10.23919/DATE.2018.8342208},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/SchillingUMGMB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/SchillingWM18,
  author       = {Robert Schilling and
                  Mario Werner and
                  Stefan Mangard},
  editor       = {Jan Madsen and
                  Ayse K. Coskun},
  title        = {Securing conditional branches in the presence of fault attacks},
  booktitle    = {2018 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2018, Dresden, Germany, March 19-23, 2018},
  pages        = {1586--1591},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/DATE.2018.8342268},
  doi          = {10.23919/DATE.2018.8342268},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/SchillingWM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BloemGIKMW18,
  author       = {Roderick Bloem and
                  Hannes Gro{\ss} and
                  Rinat Iusupov and
                  Bettina K{\"{o}}nighofer and
                  Stefan Mangard and
                  Johannes Winter},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Formal Verification of Masked Hardware Implementations in the Presence
                  of Glitches},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10821},
  pages        = {321--353},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78375-8\_11},
  doi          = {10.1007/978-3-319-78375-8\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BloemGIKMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/WernerUSM18,
  author       = {Mario Werner and
                  Thomas Unterluggauer and
                  David Schaffenrath and
                  Stefan Mangard},
  title        = {Sponge-Based Control-Flow Protection for IoT Devices},
  booktitle    = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2018, London, United Kingdom, April 24-26, 2018},
  pages        = {214--226},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EuroSP.2018.00023},
  doi          = {10.1109/EUROSP.2018.00023},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/WernerUSM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kryptotag/WeiserZSMMS18,
  author       = {Samuel Weiser and
                  Andreas Zankl and
                  Raphael Spreitzer and
                  Katja Miller and
                  Stefan Mangard and
                  Georg Sigl},
  editor       = {Daniel Loebenberger and
                  Michael N{\"{u}}sken},
  title        = {{DATA} - Differential Address Trace Analysis},
  booktitle    = {28. Krypto-Tag, Kirchheim bei M{\"{u}}nchen, Germany, June 7-8,
                  2018},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V. / {FG} {KRYPTO}},
  year         = {2018},
  url          = {https://doi.org/10.18420/cdm-2018-28-14},
  doi          = {10.18420/CDM-2018-28-14},
  timestamp    = {Fri, 18 Sep 2020 11:50:49 +0200},
  biburl       = {https://dblp.org/rec/conf/kryptotag/WeiserZSMMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/0001LGWMSM18,
  author       = {Michael Schwarz and
                  Moritz Lipp and
                  Daniel Gruss and
                  Samuel Weiser and
                  Cl{\'{e}}mentine Maurice and
                  Raphael Spreitzer and
                  Stefan Mangard},
  title        = {KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel
                  Attacks},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_04B-1\_Schwarz\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/0001LGWMSM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/DobraunigMMP18,
  author       = {Christoph Dobraunig and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  editor       = {Carlos Cid and
                  Michael J. Jacobson Jr.},
  title        = {Fault Attacks on Nonce-Based Authenticated Encryption: Application
                  to Keyak and Ketje},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference,
                  Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11349},
  pages        = {257--277},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-10970-7\_12},
  doi          = {10.1007/978-3-030-10970-7\_12},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/DobraunigMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WeiserZSMMS18,
  author       = {Samuel Weiser and
                  Andreas Zankl and
                  Raphael Spreitzer and
                  Katja Miller and
                  Stefan Mangard and
                  Georg Sigl},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {{DATA} - Differential Address Trace Analysis: Finding Address-based
                  Side-Channels in Binaries},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {603--620},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/weiser},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WeiserZSMMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Lipp0G0HFHMKGYH18,
  author       = {Moritz Lipp and
                  Michael Schwarz and
                  Daniel Gruss and
                  Thomas Prescher and
                  Werner Haas and
                  Anders Fogh and
                  Jann Horn and
                  Stefan Mangard and
                  Paul Kocher and
                  Daniel Genkin and
                  Yuval Yarom and
                  Mike Hamburg},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Meltdown: Reading Kernel Memory from User Space},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {973--990},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/lipp},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Lipp0G0HFHMKGYH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SpreitzerPM18,
  author       = {Raphael Spreitzer and
                  Gerald Palfinger and
                  Stefan Mangard},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {SCAnDroid: Automated Side-Channel Analysis of Android APIs},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {224--235},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212506},
  doi          = {10.1145/3212480.3212506},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SpreitzerPM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-01203,
  author       = {Paul Kocher and
                  Daniel Genkin and
                  Daniel Gruss and
                  Werner Haas and
                  Mike Hamburg and
                  Moritz Lipp and
                  Stefan Mangard and
                  Thomas Prescher and
                  Michael Schwarz and
                  Yuval Yarom},
  title        = {Spectre Attacks: Exploiting Speculative Execution},
  journal      = {CoRR},
  volume       = {abs/1801.01203},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.01203},
  eprinttype    = {arXiv},
  eprint       = {1801.01203},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-01203.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-01207,
  author       = {Moritz Lipp and
                  Michael Schwarz and
                  Daniel Gruss and
                  Thomas Prescher and
                  Werner Haas and
                  Stefan Mangard and
                  Paul Kocher and
                  Daniel Genkin and
                  Yuval Yarom and
                  Mike Hamburg},
  title        = {Meltdown},
  journal      = {CoRR},
  volume       = {abs/1801.01207},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.01207},
  eprinttype    = {arXiv},
  eprint       = {1801.01207},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-01207.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-06691,
  author       = {Mario Werner and
                  Thomas Unterluggauer and
                  David Schaffenrath and
                  Stefan Mangard},
  title        = {Sponge-Based Control-Flow Protection for IoT Devices},
  journal      = {CoRR},
  volume       = {abs/1802.06691},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.06691},
  eprinttype    = {arXiv},
  eprint       = {1802.06691},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-06691.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-08359,
  author       = {Robert Schilling and
                  Mario Werner and
                  Stefan Mangard},
  title        = {Securing Conditional Branches in the Presence of Fault Attacks},
  journal      = {CoRR},
  volume       = {abs/1803.08359},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.08359},
  eprinttype    = {arXiv},
  eprint       = {1803.08359},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-08359.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-08811,
  author       = {Robert Schilling and
                  Mario Werner and
                  Pascal Nasahl and
                  Stefan Mangard},
  title        = {Pointing in the Right Direction - Securing Memory Accesses in a Faulty
                  World},
  journal      = {CoRR},
  volume       = {abs/1809.08811},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.08811},
  eprinttype    = {arXiv},
  eprint       = {1809.08811},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-08811.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEKMMP18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Thomas Korak and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  title        = {Exploiting Ineffective Fault Inductions on Symmetric Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEKMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEGMMP18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Hannes Gro{\ss} and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  title        = {Statistical Ineffective Fault Attacks on Masked {AES} with Fault Countermeasures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/357},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEGMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigMMP18,
  author       = {Christoph Dobraunig and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  title        = {Fault Attacks on Nonce-based Authenticated Encryption: Application
                  to Keyak and Ketje},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {852},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/852},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossMKM18,
  author       = {Hannes Gro{\ss} and
                  Lauren De Meyer and
                  Martin Krenn and
                  Stefan Mangard},
  title        = {Masking the {AES} with Only Two Random Bits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1007},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossMKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BloemGIKM18,
  author       = {Roderick Bloem and
                  Hannes Gro{\ss} and
                  Rinat Iusupov and
                  Martin Krenn and
                  Stefan Mangard},
  title        = {Sharing Independence {\&} Relabeling: Efficient Formal Verification
                  of Higher-Order Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1031},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1031},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BloemGIKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:tr/meltdown/m18,
  author       = {Moritz Lipp and
                  Michael Schwarz and
                  Daniel Gruss and
                  Thomas Prescher and
                  Werner Haas and
                  Stefan Mangard and
                  Paul Kocher and
                  Daniel Genkin and
                  Yuval Yarom and
                  Mike Hamburg},
  title        = {Meltdown},
  journal      = {meltdownattack.com},
  year         = {2018},
  url          = {https://meltdownattack.com/meltdown.pdf},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/tr/meltdown/m18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:tr/meltdown/s18,
  author       = {Paul Kocher and
                  Daniel Genkin and
                  Daniel Gruss and
                  Werner Haas and
                  Mike Hamburg and
                  Moritz Lipp and
                  Stefan Mangard and
                  Thomas Prescher and
                  Michael Schwarz and
                  Yuval Yarom},
  title        = {Spectre Attacks: Exploiting Speculative Execution},
  journal      = {meltdownattack.com},
  year         = {2018},
  url          = {https://spectreattack.com/spectre.pdf},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/tr/meltdown/s18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcas/ContiSSPRGMGLHM17,
  author       = {Francesco Conti and
                  Robert Schilling and
                  Pasquale Davide Schiavone and
                  Antonio Pullini and
                  Davide Rossi and
                  Frank Kagan G{\"{u}}rkaynak and
                  Michael Muehlberghuber and
                  Michael Gautschi and
                  Igor Loi and
                  Germain Haugou and
                  Stefan Mangard and
                  Luca Benini},
  title        = {An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor
                  Analytics},
  journal      = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.},
  volume       = {64-I},
  number       = {9},
  pages        = {2481--2494},
  year         = {2017},
  url          = {https://doi.org/10.1109/TCSI.2017.2698019},
  doi          = {10.1109/TCSI.2017.2698019},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcas/ContiSSPRGMGLHM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DobraunigEMMU17,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Stefan Mangard and
                  Florian Mendel and
                  Thomas Unterluggauer},
  title        = {{ISAP} - Towards Side-Channel Secure Authenticated Encryption},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {80--105},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.80-105},
  doi          = {10.13154/TOSC.V2017.I1.80-105},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DobraunigEMMU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/UnterluggauerKM17,
  author       = {Thomas Unterluggauer and
                  Thomas Korak and
                  Stefan Mangard and
                  Robert Schilling and
                  Luca Benini and
                  Frank K. G{\"{u}}rkaynak and
                  Michael Muehlberghuber},
  editor       = {Thomas Eisenbarth and
                  Yannick Teglia},
  title        = {Leakage Bounds for Gaussian Side Channels},
  booktitle    = {Smart Card Research and Advanced Applications - 16th International
                  Conference, {CARDIS} 2017, Lugano, Switzerland, November 13-15, 2017,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10728},
  pages        = {88--104},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-75208-2\_6},
  doi          = {10.1007/978-3-319-75208-2\_6},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/UnterluggauerKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/UnterluggauerWM17,
  author       = {Thomas Unterluggauer and
                  Mario Werner and
                  Stefan Mangard},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Securing Memory Encryption and Authentication Against Side-Channel
                  Attacks Using Unprotected Primitives},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {690--702},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3052985},
  doi          = {10.1145/3052973.3052985},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/UnterluggauerWM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GrossM17,
  author       = {Hannes Gro{\ss} and
                  Stefan Mangard},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Reconciling d+1 Masking in Hardware and Software},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {115--136},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_6},
  doi          = {10.1007/978-3-319-66787-4\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GrossM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PrimasPM17,
  author       = {Robert Primas and
                  Peter Pessl and
                  Stefan Mangard},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {513--533},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_25},
  doi          = {10.1007/978-3-319-66787-4\_25},
  timestamp    = {Mon, 18 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PrimasPM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GrossMK17,
  author       = {Hannes Gro{\ss} and
                  Stefan Mangard and
                  Thomas Korak},
  editor       = {Helena Handschuh},
  title        = {An Efficient Side-Channel Protected {AES} Implementation with Arbitrary
                  Protection Order},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at
                  the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10159},
  pages        = {95--112},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-52153-4\_6},
  doi          = {10.1007/978-3-319-52153-4\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GrossMK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/UnterluggauerWM17,
  author       = {Thomas Unterluggauer and
                  Mario Werner and
                  Stefan Mangard},
  editor       = {David Atienza and
                  Giorgio Di Natale},
  title        = {Side-channel plaintext-recovery attacks on leakage-resilient encryption},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2017, Lausanne, Switzerland, March 27-31, 2017},
  pages        = {1318--1323},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/DATE.2017.7927197},
  doi          = {10.23919/DATE.2017.7927197},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/date/UnterluggauerWM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/SchwarzWGMM17,
  author       = {Michael Schwarz and
                  Samuel Weiser and
                  Daniel Gruss and
                  Cl{\'{e}}mentine Maurice and
                  Stefan Mangard},
  editor       = {Michalis Polychronakis and
                  Michael Meier},
  title        = {Malware Guard Extension: Using {SGX} to Conceal Cache Attacks},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July
                  6-7, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10327},
  pages        = {3--24},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60876-1\_1},
  doi          = {10.1007/978-3-319-60876-1\_1},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/SchwarzWGMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/GrossSM17,
  author       = {Hannes Gro{\ss} and
                  David Schaffenrath and
                  Stefan Mangard},
  editor       = {Hana Kub{\'{a}}tov{\'{a}} and
                  Martin Novotn{\'{y}} and
                  Amund Skavhaug},
  title        = {Higher-Order Side-Channel Protected Implementations of {KECCAK}},
  booktitle    = {Euromicro Conference on Digital System Design, {DSD} 2017, Vienna,
                  Austria, August 30 - Sept. 1, 2017},
  pages        = {205--212},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSD.2017.21},
  doi          = {10.1109/DSD.2017.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/GrossSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LippGSBMM17,
  author       = {Moritz Lipp and
                  Daniel Gruss and
                  Michael Schwarz and
                  David Bidner and
                  Cl{\'{e}}mentine Maurice and
                  Stefan Mangard},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Practical Keystroke Timing Attacks in Sandboxed JavaScript},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10493},
  pages        = {191--209},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66399-9\_11},
  doi          = {10.1007/978-3-319-66399-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LippGSBMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/GrussLSFMM17,
  author       = {Daniel Gruss and
                  Moritz Lipp and
                  Michael Schwarz and
                  Richard Fellner and
                  Cl{\'{e}}mentine Maurice and
                  Stefan Mangard},
  editor       = {Eric Bodden and
                  Mathias Payer and
                  Elias Athanasopoulos},
  title        = {{KASLR} is Dead: Long Live {KASLR}},
  booktitle    = {Engineering Secure Software and Systems - 9th International Symposium,
                  ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10379},
  pages        = {161--176},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-62105-0\_11},
  doi          = {10.1007/978-3-319-62105-0\_11},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/GrussLSFMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/SchwarzMGM17,
  author       = {Michael Schwarz and
                  Cl{\'{e}}mentine Maurice and
                  Daniel Gruss and
                  Stefan Mangard},
  editor       = {Aggelos Kiayias},
  title        = {Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural
                  Attacks in JavaScript},
  booktitle    = {Financial Cryptography and Data Security - 21st International Conference,
                  {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  pages        = {247--267},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70972-7\_13},
  doi          = {10.1007/978-3-319-70972-7\_13},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/SchwarzMGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/WernerUSSM17,
  author       = {Mario Werner and
                  Thomas Unterluggauer and
                  Robert Schilling and
                  David Schaffenrath and
                  Stefan Mangard},
  editor       = {Marco D. Santambrogio and
                  Diana G{\"{o}}hringer and
                  Dirk Stroobandt and
                  Nele Mentens and
                  Jari Nurmi},
  title        = {Transparent memory encryption and authentication},
  booktitle    = {27th International Conference on Field Programmable Logic and Applications,
                  {FPL} 2017, Ghent, Belgium, September 4-8, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/FPL.2017.8056797},
  doi          = {10.23919/FPL.2017.8056797},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/WernerUSSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipeac/GurkaynakSM0MB17,
  author       = {Frank K. G{\"{u}}rkaynak and
                  Robert Schilling and
                  Michael Muehlberghuber and
                  Francesco Conti and
                  Stefan Mangard and
                  Luca Benini},
  editor       = {Mats Brorsson and
                  Zhonghai Lu and
                  Giovanni Agosta and
                  Alessandro Barenghi and
                  Gerardo Pelosi},
  title        = {Multi-core data analytics SoC with a flexible 1.76 Gbit/s {AES-XTS}
                  cryptographic accelerator in 65 nm {CMOS}},
  booktitle    = {Proceedings of the Fourth Workshop on Cryptography and Security in
                  Computing Systems, CS2@HiPEAC 2017, Stockholm, Sweden, January 24,
                  2017},
  pages        = {19--24},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3031836.3031840},
  doi          = {10.1145/3031836.3031840},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hipeac/GurkaynakSM0MB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MauriceW0GGBMR17,
  author       = {Cl{\'{e}}mentine Maurice and
                  Manuel Weber and
                  Michael Schwarz and
                  Lukas Giner and
                  Daniel Gruss and
                  Carlo Alberto Boano and
                  Stefan Mangard and
                  Kay R{\"{o}}mer},
  title        = {Hello from the Other Side: {SSH} over Robust Cache Covert Channels
                  in the Cloud},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/hello-other-side-ssh-over-robust-cache-covert-channels-cloud/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/MauriceW0GGBMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SchwarzWGMM17,
  author       = {Michael Schwarz and
                  Samuel Weiser and
                  Daniel Gruss and
                  Cl{\'{e}}mentine Maurice and
                  Stefan Mangard},
  title        = {Malware Guard Extension: Using {SGX} to Conceal Cache Attacks},
  journal      = {CoRR},
  volume       = {abs/1702.08719},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.08719},
  eprinttype    = {arXiv},
  eprint       = {1702.08719},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SchwarzWGMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SchwarzLGWMSM17,
  author       = {Michael Schwarz and
                  Moritz Lipp and
                  Daniel Gruss and
                  Samuel Weiser and
                  Cl{\'{e}}mentine Maurice and
                  Raphael Spreitzer and
                  Stefan Mangard},
  title        = {KeyDrown: Eliminating Keystroke Timing Side-Channel Attacks},
  journal      = {CoRR},
  volume       = {abs/1706.06381},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.06381},
  eprinttype    = {arXiv},
  eprint       = {1706.06381},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SchwarzLGWMSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-01254,
  author       = {Michael Schwarz and
                  Daniel Gruss and
                  Moritz Lipp and
                  Cl{\'{e}}mentine Maurice and
                  Thomas Schuster and
                  Anders Fogh and
                  Stefan Mangard},
  title        = {Automated Detection, Exploitation, and Elimination of Double-Fetch
                  Bugs using Modern {CPU} Features},
  journal      = {CoRR},
  volume       = {abs/1711.01254},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.01254},
  eprinttype    = {arXiv},
  eprint       = {1711.01254},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-01254.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossM17,
  author       = {Hannes Gro{\ss} and
                  Stefan Mangard},
  title        = {Reconciling d+1Masking in Hardware and Software},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossSM17,
  author       = {Hannes Gro{\ss} and
                  David Schaffenrath and
                  Stefan Mangard},
  title        = {Higher-Order Side-Channel Protected Implementations of Keccak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {395},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/395},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PrimasPM17,
  author       = {Robert Primas and
                  Peter Pessl and
                  Stefan Mangard},
  title        = {Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {594},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/594},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PrimasPM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/UnterluggauerWM17,
  author       = {Thomas Unterluggauer and
                  Mario Werner and
                  Stefan Mangard},
  title        = {Securing Memory Encryption and Authentication Against Side-Channel
                  Attacks Using Unprotected Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {663},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/663},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/UnterluggauerWM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WernerUSSM17,
  author       = {Mario Werner and
                  Thomas Unterluggauer and
                  Robert Schilling and
                  David Schaffenrath and
                  Stefan Mangard},
  title        = {Transparent Memory Encryption and Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {674},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/674},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WernerUSSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BloemGIKMW17,
  author       = {Roderick Bloem and
                  Hannes Gro{\ss} and
                  Rinat Iusupov and
                  Bettina K{\"{o}}nighofer and
                  Stefan Mangard and
                  Johannes Winter},
  title        = {Formal Verification of Masked Hardware Implementations in the Presence
                  of Glitches},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {897},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/897},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BloemGIKMW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/UnterluggauerKM17,
  author       = {Thomas Unterluggauer and
                  Thomas Korak and
                  Stefan Mangard and
                  Robert Schilling and
                  Luca Benini and
                  Frank K. G{\"{u}}rkaynak and
                  Michael Muehlberghuber},
  title        = {Leakage Bounds for Gaussian Side Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {992},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/992},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/UnterluggauerKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/GrossJMUW16,
  author       = {Hannes Gro{\ss} and
                  Manuel Jelinek and
                  Stefan Mangard and
                  Thomas Unterluggauer and
                  Mario Werner},
  editor       = {Kerstin Lemke{-}Rust and
                  Michael Tunstall},
  title        = {Concealing Secrets in Embedded Processors Designs},
  booktitle    = {Smart Card Research and Advanced Applications - 15th International
                  Conference, {CARDIS} 2016, Cannes, France, November 7-9, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10146},
  pages        = {89--104},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54669-8\_6},
  doi          = {10.1007/978-3-319-54669-8\_6},
  timestamp    = {Fri, 27 Mar 2020 08:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/GrossJMUW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GrossMK16,
  author       = {Hannes Gro{\ss} and
                  Stefan Mangard and
                  Thomas Korak},
  editor       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Domain-Oriented Masking: Compact Masked Hardware Implementations with
                  Arbitrary Protection Order},
  booktitle    = {Proceedings of the {ACM} Workshop on Theory of Implementation Security,
                  TIS@CCS 2016 Vienna, Austria, October, 2016},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996366.2996426},
  doi          = {10.1145/2996366.2996426},
  timestamp    = {Sat, 30 Sep 2023 09:36:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GrossMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GrussMFLM16,
  author       = {Daniel Gruss and
                  Cl{\'{e}}mentine Maurice and
                  Anders Fogh and
                  Moritz Lipp and
                  Stefan Mangard},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Prefetch Side-Channel Attacks: Bypassing {SMAP} and Kernel {ASLR}},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {368--379},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978356},
  doi          = {10.1145/2976749.2978356},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GrussMFLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/UnterluggauerM16,
  author       = {Thomas Unterluggauer and
                  Stefan Mangard},
  editor       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Elisabeth Oswald},
  title        = {Exploiting the Physical Disparity: Side-Channel Attacks on Memory
                  Encryption},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 7th International
                  Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9689},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-43283-0\_1},
  doi          = {10.1007/978-3-319-43283-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/UnterluggauerM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/PesslM16,
  author       = {Peter Pessl and
                  Stefan Mangard},
  editor       = {Kazue Sako},
  title        = {Enhancing Side-Channel Analysis of Binary-Field Multiplication with
                  Bit Reliability},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
                  the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
                  4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9610},
  pages        = {255--270},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29485-8\_15},
  doi          = {10.1007/978-3-319-29485-8\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/PesslM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/GrussMWM16,
  author       = {Daniel Gruss and
                  Cl{\'{e}}mentine Maurice and
                  Klaus Wagner and
                  Stefan Mangard},
  editor       = {Juan Caballero and
                  Urko Zurutuza and
                  Ricardo J. Rodr{\'{\i}}guez},
  title        = {Flush+Flush: {A} Fast and Stealthy Cache Attack},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 13th International Conference, {DIMVA} 2016, San Sebasti{\'{a}}n,
                  Spain, July 7-8, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9721},
  pages        = {279--299},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40667-1\_14},
  doi          = {10.1007/978-3-319-40667-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/GrussMWM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/GrussMM16,
  author       = {Daniel Gruss and
                  Cl{\'{e}}mentine Maurice and
                  Stefan Mangard},
  editor       = {Juan Caballero and
                  Urko Zurutuza and
                  Ricardo J. Rodr{\'{\i}}guez},
  title        = {Rowhammer.js: {A} Remote Software-Induced Fault Attack in JavaScript},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 13th International Conference, {DIMVA} 2016, San Sebasti{\'{a}}n,
                  Spain, July 7-8, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9721},
  pages        = {300--321},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40667-1\_15},
  doi          = {10.1007/978-3-319-40667-1\_15},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/GrussMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LippGSMM16,
  author       = {Moritz Lipp and
                  Daniel Gruss and
                  Raphael Spreitzer and
                  Cl{\'{e}}mentine Maurice and
                  Stefan Mangard},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {ARMageddon: Cache Attacks on Mobile Devices},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {549--564},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/lipp},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LippGSMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PesslGMSM16,
  author       = {Peter Pessl and
                  Daniel Gruss and
                  Cl{\'{e}}mentine Maurice and
                  Michael Schwarz and
                  Stefan Mangard},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {{DRAMA:} Exploiting {DRAM} Addressing for Cross-CPU Attacks},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {565--581},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/pessl},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PesslGMSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SpreitzerGKM16,
  author       = {Raphael Spreitzer and
                  Simone Griesmayr and
                  Thomas Korak and
                  Stefan Mangard},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Exploiting Data-Usage Statistics for Website Fingerprinting Attacks
                  on Android},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {49--60},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939922},
  doi          = {10.1145/2939918.2939922},
  timestamp    = {Tue, 06 Nov 2018 16:59:31 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SpreitzerGKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016ccsw,
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Mathias Payer and
                  Stefan Mangard and
                  Elli Androulaki and
                  Michael K. Reiter},
  title        = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop,
                  {CCSW} 2016, Vienna, Austria, October 28, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996429},
  doi          = {10.1145/2996429},
  isbn         = {978-1-4503-4572-9},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2016ccsw.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016cpsspc,
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Mathias Payer and
                  Stefan Mangard and
                  Alvaro A. C{\'{a}}rdenas and
                  Rakesh B. Bobba},
  title        = {Proceedings of the 2nd {ACM} Workshop on Cyber-Physical Systems Security
                  and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2994487},
  doi          = {10.1145/2994487},
  isbn         = {978-1-4503-4568-2},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2016cpsspc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016trusted,
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Mathias Payer and
                  Stefan Mangard and
                  Xinxin Fan and
                  Tim G{\"{u}}neysu},
  title        = {Proceedings of the 6th International Workshop on Trustworthy Embedded
                  Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995289},
  doi          = {10.1145/2995289},
  isbn         = {978-1-4503-4567-5},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2016trusted.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SpreitzerMKM16,
  author       = {Raphael Spreitzer and
                  Veelasha Moonsamy and
                  Thomas Korak and
                  Stefan Mangard},
  title        = {SoK: Systematic Classification of Side-Channel Attacks on Mobile Devices},
  journal      = {CoRR},
  volume       = {abs/1611.03748},
  year         = {2016},
  url          = {http://arxiv.org/abs/1611.03748},
  eprinttype    = {arXiv},
  eprint       = {1611.03748},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SpreitzerMKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/0001SSPRGMGLHMB16,
  author       = {Francesco Conti and
                  Robert Schilling and
                  Pasquale Davide Schiavone and
                  Antonio Pullini and
                  Davide Rossi and
                  Frank Kagan G{\"{u}}rkaynak and
                  Michael Muehlberghuber and
                  Michael Gautschi and
                  Igor Loi and
                  Germain Haugou and
                  Stefan Mangard and
                  Luca Benini},
  title        = {An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor
                  Analytics},
  journal      = {CoRR},
  volume       = {abs/1612.05974},
  year         = {2016},
  url          = {http://arxiv.org/abs/1612.05974},
  eprinttype    = {arXiv},
  eprint       = {1612.05974},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/0001SSPRGMGLHMB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/UnterluggauerM16,
  author       = {Thomas Unterluggauer and
                  Stefan Mangard},
  title        = {Exploiting the Physical Disparity: Side-Channel Attacks on Memory
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {473},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/473},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/UnterluggauerM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossMK16,
  author       = {Hannes Gro{\ss} and
                  Stefan Mangard and
                  Thomas Korak},
  title        = {Domain-Oriented Masking: Compact Masked Hardware Implementations with
                  Arbitrary Protection Order},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/486},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossJMUW16,
  author       = {Hannes Gro{\ss} and
                  Manuel Jelinek and
                  Stefan Mangard and
                  Thomas Unterluggauer and
                  Mario Werner},
  title        = {Concealing Secrets in Embedded Processors Designs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {935},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/935},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossJMUW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEMMU16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Stefan Mangard and
                  Florian Mendel and
                  Thomas Unterluggauer},
  title        = {{ISAP} - Authenticated Encryption Inherently Secure Against Passive
                  Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {952},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/952},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEMMU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/UnterluggauerWM16,
  author       = {Thomas Unterluggauer and
                  Mario Werner and
                  Stefan Mangard},
  title        = {Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1074},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/UnterluggauerWM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/WernerWM15,
  author       = {Mario Werner and
                  Erich Wenger and
                  Stefan Mangard},
  editor       = {Naofumi Homma and
                  Marcel Medwed},
  title        = {Protecting the Control Flow of Embedded Processors against Fault Attacks},
  booktitle    = {Smart Card Research and Advanced Applications - 14th International
                  Conference, {CARDIS} 2015, Bochum, Germany, November 4-6, 2015. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9514},
  pages        = {161--176},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31271-2\_10},
  doi          = {10.1007/978-3-319-31271-2\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/WernerWM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/DobraunigKMMS15,
  author       = {Christoph Dobraunig and
                  Fran{\c{c}}ois Koeune and
                  Stefan Mangard and
                  Florian Mendel and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Naofumi Homma and
                  Marcel Medwed},
  title        = {Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security},
  booktitle    = {Smart Card Research and Advanced Applications - 14th International
                  Conference, {CARDIS} 2015, Bochum, Germany, November 4-6, 2015. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9514},
  pages        = {225--241},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31271-2\_14},
  doi          = {10.1007/978-3-319-31271-2\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/DobraunigKMMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GrussBM15,
  author       = {Daniel Gruss and
                  David Bidner and
                  Stefan Mangard},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Practical Memory Deduplication Attacks in Sandboxed Javascript},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9326},
  pages        = {108--122},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24174-6\_6},
  doi          = {10.1007/978-3-319-24174-6\_6},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/GrussBM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/Mangard15,
  author       = {Stefan Mangard},
  editor       = {Naofumi Homma and
                  Victor Lomn{\'{e}}},
  title        = {Fault Attacks at the System Level - The Challenge of Securing Application
                  Software},
  booktitle    = {2015 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2015, Saint Malo, France, September 13, 2015},
  pages        = {1},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/FDTC.2015.23},
  doi          = {10.1109/FDTC.2015.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/Mangard15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GrussSM15,
  author       = {Daniel Gruss and
                  Raphael Spreitzer and
                  Stefan Mangard},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Cache Template Attacks: Automating Attacks on Inclusive Last-Level
                  Caches},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {897--912},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/gruss},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GrussSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cosade/2015,
  editor       = {Stefan Mangard and
                  Axel Y. Poschmann},
  title        = {Constructive Side-Channel Analysis and Secure Design - 6th International
                  Workshop, {COSADE} 2015, Berlin, Germany, April 13-14, 2015. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9064},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-21476-4},
  doi          = {10.1007/978-3-319-21476-4},
  isbn         = {978-3-319-21475-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rfidsec/2015,
  editor       = {Stefan Mangard and
                  Patrick Schaumont},
  title        = {Radio Frequency Identification. Security and Privacy Issues - 11th
                  International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24,
                  2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9440},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24837-0},
  doi          = {10.1007/978-3-319-24837-0},
  isbn         = {978-3-319-24836-3},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GrussMM15,
  author       = {Daniel Gruss and
                  Cl{\'{e}}mentine Maurice and
                  Stefan Mangard},
  title        = {Rowhammer.js: {A} Remote Software-Induced Fault Attack in JavaScript},
  journal      = {CoRR},
  volume       = {abs/1507.06955},
  year         = {2015},
  url          = {http://arxiv.org/abs/1507.06955},
  eprinttype    = {arXiv},
  eprint       = {1507.06955},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GrussMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LippGSM15,
  author       = {Moritz Lipp and
                  Daniel Gruss and
                  Raphael Spreitzer and
                  Stefan Mangard},
  title        = {ARMageddon: Last-Level Cache Attacks on Mobile Devices},
  journal      = {CoRR},
  volume       = {abs/1511.04897},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.04897},
  eprinttype    = {arXiv},
  eprint       = {1511.04897},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LippGSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PesslGMM15,
  author       = {Peter Pessl and
                  Daniel Gruss and
                  Cl{\'{e}}mentine Maurice and
                  Stefan Mangard},
  title        = {Reverse Engineering Intel {DRAM} Addressing and Exploitation},
  journal      = {CoRR},
  volume       = {abs/1511.08756},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.08756},
  eprinttype    = {arXiv},
  eprint       = {1511.08756},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PesslGMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEMM15,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Stefan Mangard and
                  Florian Mendel},
  title        = {On the Security of Fresh Re-keying to Counteract Side-Channel and
                  Fault Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BelaidSHMMSST14,
  author       = {Sonia Bela{\"{\i}}d and
                  Fabrizio De Santis and
                  Johann Heyszl and
                  Stefan Mangard and
                  Marcel Medwed and
                  J{\"{o}}rn{-}Marc Schmidt and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Stefan Tillich},
  title        = {Towards fresh re-keying with leakage-resilient PRFs: cipher design
                  principles and analysis},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {3},
  pages        = {157--171},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0079-5},
  doi          = {10.1007/S13389-014-0079-5},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BelaidSHMMSST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/DobraunigEMM14,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Stefan Mangard and
                  Florian Mendel},
  editor       = {Marc Joye and
                  Amir Moradi},
  title        = {On the Security of Fresh Re-keying to Counteract Side-Channel and
                  Fault Attacks},
  booktitle    = {Smart Card Research and Advanced Applications - 13th International
                  Conference, {CARDIS} 2014, Paris, France, November 5-7, 2014. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8968},
  pages        = {233--244},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16763-3\_14},
  doi          = {10.1007/978-3-319-16763-3\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/DobraunigEMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Mangard13,
  author       = {Stefan Mangard},
  title        = {Keeping Secrets on Low-Cost Chips},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {11},
  number       = {4},
  pages        = {75--77},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSP.2013.88},
  doi          = {10.1109/MSP.2013.88},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Mangard13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/HeyszlIMSS13,
  author       = {Johann Heyszl and
                  Andreas Ibing and
                  Stefan Mangard and
                  Fabrizio De Santis and
                  Georg Sigl},
  editor       = {Aur{\'{e}}lien Francillon and
                  Pankaj Rohatgi},
  title        = {Clustering Algorithms for Non-profiled Single-Execution Attacks on
                  Exponentiations},
  booktitle    = {Smart Card Research and Advanced Applications - 12th International
                  Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013.
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8419},
  pages        = {79--93},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-08302-5\_6},
  doi          = {10.1007/978-3-319-08302-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/HeyszlIMSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/SantisKMSSS13,
  author       = {Fabrizio De Santis and
                  Michael Kasper and
                  Stefan Mangard and
                  Georg Sigl and
                  Oliver Stein and
                  Marc St{\"{o}}ttinger},
  editor       = {Goutam Paul and
                  Serge Vaudenay},
  title        = {On the Relationship between Correlation Power Analysis and the Stochastic
                  Approach: An {ASIC} Designer Perspective},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2013 - 14th International Conference
                  on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8250},
  pages        = {215--226},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03515-4\_14},
  doi          = {10.1007/978-3-319-03515-4\_14},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/SantisKMSSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cardis/2012,
  editor       = {Stefan Mangard},
  title        = {Smart Card Research and Advanced Applications - 11th International
                  Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7771},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-37288-9},
  doi          = {10.1007/978-3-642-37288-9},
  isbn         = {978-3-642-37287-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelaidSHMMSST13,
  author       = {Sonia Bela{\"{\i}}d and
                  Fabrizio De Santis and
                  Johann Heyszl and
                  Stefan Mangard and
                  Marcel Medwed and
                  J{\"{o}}rn{-}Marc Schmidt and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Stefan Tillich},
  title        = {Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design
                  Principles and Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/305},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BelaidSHMMSST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeyszlIMSS13,
  author       = {Johann Heyszl and
                  Andreas Ibing and
                  Stefan Mangard and
                  Fabrizio De Santis and
                  Georg Sigl},
  title        = {Clustering Algorithms for Non-Profiled Single-Execution Attacks on
                  Exponentiations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeyszlIMSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mangard12,
  author       = {Stefan Mangard},
  title        = {Die physikalische Sicherheit eingebetteter Systeme},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {12},
  pages        = {867--871},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0292-2},
  doi          = {10.1007/S11623-012-0292-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mangard12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/HutterKPSM12,
  author       = {Michael Hutter and
                  Mario Kirschbaum and
                  Thomas Plos and
                  J{\"{o}}rn{-}Marc Schmidt and
                  Stefan Mangard},
  editor       = {Werner Schindler and
                  Sorin A. Huss},
  title        = {Exploiting the Difference of Side-Channel Leakages},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - Third International
                  Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7275},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29912-4\_1},
  doi          = {10.1007/978-3-642-29912-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/HutterKPSM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/HeyszlMHSS12,
  author       = {Johann Heyszl and
                  Stefan Mangard and
                  Benedikt Heinz and
                  Frederic Stumpf and
                  Georg Sigl},
  editor       = {Orr Dunkelman},
  title        = {Localized Electromagnetic Analysis of Cryptographic Implementations},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {231--244},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_15},
  doi          = {10.1007/978-3-642-27954-6\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/HeyszlMHSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/MangardOS11,
  author       = {Stefan Mangard and
                  Elisabeth Oswald and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {One for all - all for one: unifying standard differential power analysis
                  attacks},
  journal      = {{IET} Inf. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {100--110},
  year         = {2011},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0096},
  doi          = {10.1049/IET-IFS.2010.0096},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/MangardOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/MedwedM11,
  author       = {Marcel Medwed and
                  Stefan Mangard},
  title        = {Arithmetic logic units with high error detection rates to counteract
                  fault attacks},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 2011, Grenoble, France,
                  March 14-18, 2011},
  pages        = {1644--1649},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/DATE.2011.5763261},
  doi          = {10.1109/DATE.2011.5763261},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/MedwedM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/et/GammelM10,
  author       = {Berndt M. Gammel and
                  Stefan Mangard},
  title        = {On the Duality of Probing and Fault Attacks},
  journal      = {J. Electron. Test.},
  volume       = {26},
  number       = {4},
  pages        = {483--493},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10836-010-5160-0},
  doi          = {10.1007/S10836-010-5160-0},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/et/GammelM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/StandaertVOGMKM10,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon and
                  Elisabeth Oswald and
                  Benedikt Gierlichs and
                  Marcel Medwed and
                  Markus Kasper and
                  Stefan Mangard},
  editor       = {Masayuki Abe},
  title        = {The World Is Not Enough: Another Look on Second-Order {DPA}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {112--129},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_7},
  doi          = {10.1007/978-3-642-17373-8\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/StandaertVOGMKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/10/OswaldM10,
  author       = {Elisabeth Oswald and
                  Stefan Mangard},
  editor       = {Ingrid M. R. Verbauwhede},
  title        = {Counteracting Power Analysis Attacks by Masking},
  booktitle    = {Secure Integrated Circuits and Systems},
  series       = {Integrated Circuits and Systems},
  pages        = {159--178},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-0-387-71829-3\_9},
  doi          = {10.1007/978-0-387-71829-3\_9},
  timestamp    = {Wed, 26 Jun 2019 18:00:01 +0200},
  biburl       = {https://dblp.org/rec/books/sp/10/OswaldM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2010,
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9},
  doi          = {10.1007/978-3-642-15031-9},
  isbn         = {978-3-642-15030-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StandaertVOGMKM10,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon and
                  Elisabeth Oswald and
                  Benedikt Gierlichs and
                  Marcel Medwed and
                  Markus Kasper and
                  Stefan Mangard},
  title        = {The World is Not Enough: Another Look on Second-Order {DPA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StandaertVOGMKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/PoppKM09,
  author       = {Thomas Popp and
                  Mario Kirschbaum and
                  Stefan Mangard},
  editor       = {Marc Fischlin},
  title        = {Practical Attacks on Masked Hardware},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
                  the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5473},
  pages        = {211--225},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00862-7\_14},
  doi          = {10.1007/978-3-642-00862-7\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/PoppKM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0907-4273,
  author       = {Berndt M. Gammel and
                  Stefan Mangard},
  title        = {On the Duality of Probing and Fault Attacks},
  journal      = {CoRR},
  volume       = {abs/0907.4273},
  year         = {2009},
  url          = {http://arxiv.org/abs/0907.4273},
  eprinttype    = {arXiv},
  eprint       = {0907.4273},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0907-4273.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GammelM09,
  author       = {Berndt M. Gammel and
                  Stefan Mangard},
  title        = {On the Duality of Probing and Fault Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/352},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GammelM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MangardOS09,
  author       = {Stefan Mangard and
                  Elisabeth Oswald and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {One for All - All for One: Unifying Standard {DPA} Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {449},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/449},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MangardOS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0017272,
  author       = {Stefan Mangard and
                  Elisabeth Oswald and
                  Thomas Popp},
  title        = {Power analysis attacks - revealing the secrets of smart cards},
  publisher    = {Springer},
  year         = {2007},
  isbn         = {978-0-387-30857-9},
  timestamp    = {Mon, 21 Feb 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0017272.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dt/PoppMO07,
  author       = {Thomas Popp and
                  Stefan Mangard and
                  Elisabeth Oswald},
  title        = {Power Analysis Attacks and Countermeasures},
  journal      = {{IEEE} Des. Test Comput.},
  volume       = {24},
  number       = {6},
  pages        = {535--543},
  year         = {2007},
  url          = {https://doi.org/10.1109/MDT.2007.200},
  doi          = {10.1109/MDT.2007.200},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dt/PoppMO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/TillichHM07,
  author       = {Stefan Tillich and
                  Christoph Herbst and
                  Stefan Mangard},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Protecting {AES} Software Implementations on 32-Bit Processors Against
                  Power Analysis},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {141--157},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_10},
  doi          = {10.1007/978-3-540-72738-5\_10},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/TillichHM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PoppKZM07,
  author       = {Thomas Popp and
                  Mario Kirschbaum and
                  Thomas Zefferer and
                  Stefan Mangard},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Evaluation of the Masked Logic Style {MDPL} on a Prototype Chip},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {81--94},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_6},
  doi          = {10.1007/978-3-540-74735-2\_6},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PoppKZM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HutterMF07,
  author       = {Michael Hutter and
                  Stefan Mangard and
                  Martin Feldhofer},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Power and {EM} Attacks on Passive 13.56 MHz {RFID} Devices},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {320--333},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_22},
  doi          = {10.1007/978-3-540-74735-2\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HutterMF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/OswaldM07,
  author       = {Elisabeth Oswald and
                  Stefan Mangard},
  editor       = {Masayuki Abe},
  title        = {Template Attacks on Masking - Resistance Is Futile},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
                  the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4377},
  pages        = {243--256},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/11967668\_16},
  doi          = {10.1007/11967668\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/OswaldM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vlsid/RaviM07,
  author       = {Srivaths Ravi and
                  Stefan Mangard},
  title        = {Tutorial {T1:} Designing Secure SoCs},
  booktitle    = {20th International Conference on {VLSI} Design {(VLSI} Design 2007),
                  Sixth International Conference on Embedded Systems {(ICES} 2007),
                  6-10 January 2007, Bangalore, India},
  pages        = {3},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/VLSID.2007.165},
  doi          = {10.1109/VLSID.2007.165},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vlsid/RaviM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HerbstOM06,
  author       = {Christoph Herbst and
                  Elisabeth Oswald and
                  Stefan Mangard},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Feng Bao},
  title        = {An {AES} Smart Card Implementation Resistant to Power Analysis Attacks},
  booktitle    = {Applied Cryptography and Network Security, 4th International Conference,
                  {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3989},
  pages        = {239--252},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767480\_16},
  doi          = {10.1007/11767480\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/HerbstOM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MangardS06,
  author       = {Stefan Mangard and
                  Kai Schramm},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Pinpointing the Side-Channel Leakage of Masked {AES} Hardware Implementations},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {76--90},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_7},
  doi          = {10.1007/11894063\_7},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MangardS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/OswaldMHT06,
  author       = {Elisabeth Oswald and
                  Stefan Mangard and
                  Christoph Herbst and
                  Stefan Tillich},
  editor       = {David Pointcheval},
  title        = {Practical Second-Order {DPA} Attacks for Masked Smart Card Implementations
                  of Block Ciphers},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
                  the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3860},
  pages        = {192--207},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11605805\_13},
  doi          = {10.1007/11605805\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/OswaldMHT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/AignerMMMOPST06,
  author       = {Manfred Josef Aigner and
                  Stefan Mangard and
                  Francesco Menichelli and
                  Renato Menicocci and
                  Mauro Olivieri and
                  Thomas Popp and
                  Giuseppe Scotti and
                  Alessandro Trifiletti},
  title        = {Side channel analysis resistant design flow},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2006), 21-24
                  May 2006, Island of Kos, Greece},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISCAS.2006.1693233},
  doi          = {10.1109/ISCAS.2006.1693233},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/AignerMMMOPST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/PoppM06,
  author       = {Thomas Popp and
                  Stefan Mangard},
  title        = {Implementation aspects of the DPA-resistant logic style {MDPL}},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2006), 21-24
                  May 2006, Island of Kos, Greece},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISCAS.2006.1693234},
  doi          = {10.1109/ISCAS.2006.1693234},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/PoppM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YooHMOM06,
  author       = {HyungSo Yoo and
                  Christoph Herbst and
                  Stefan Mangard and
                  Elisabeth Oswald and
                  Sang{-}Jae Moon},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Investigations of Power Analysis Attacks and Countermeasures for {ARIA}},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {160--172},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_13},
  doi          = {10.1007/978-3-540-71093-6\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YooHMOM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MangardPO05,
  author       = {Stefan Mangard and
                  Norbert Pramstaller and
                  Elisabeth Oswald},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Successfully Attacking Masked {AES} Hardware Implementations},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {157--171},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_12},
  doi          = {10.1007/11545262\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MangardPO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PoppM05,
  author       = {Thomas Popp and
                  Stefan Mangard},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing
                  Constraints},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {172--186},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_13},
  doi          = {10.1007/11545262\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PoppM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MangardPG05,
  author       = {Stefan Mangard and
                  Thomas Popp and
                  Berndt M. Gammel},
  editor       = {Alfred Menezes},
  title        = {Side-Channel Leakage of Masked {CMOS} Gates},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at
                  the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3376},
  pages        = {351--365},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30574-3\_24},
  doi          = {10.1007/978-3-540-30574-3\_24},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MangardPG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/OswaldMPR05,
  author       = {Elisabeth Oswald and
                  Stefan Mangard and
                  Norbert Pramstaller and
                  Vincent Rijmen},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {A Side-Channel Analysis Resistant Description of the {AES} S-Box},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {413--423},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_28},
  doi          = {10.1007/11502760\_28},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/OswaldMPR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/AignerMMOST05,
  author       = {Manfred Josef Aigner and
                  Stefan Mangard and
                  Renato Menicocci and
                  Mauro Olivieri and
                  Giuseppe Scotti and
                  Alessandro Trifiletti},
  title        = {A novel {CMOS} logic style with data independent power consumption},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2005), 23-26
                  May 2005, Kobe, Japan},
  pages        = {1066--1069},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISCAS.2005.1464776},
  doi          = {10.1109/ISCAS.2005.1464776},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/AignerMMOST05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/PramstallerMDW04,
  author       = {Norbert Pramstaller and
                  Stefan Mangard and
                  Sandra Dominikus and
                  Johannes Wolkerstorfer},
  editor       = {Hans Dobbertin and
                  Vincent Rijmen and
                  Aleksandra Sowa},
  title        = {Efficient {AES} Implementations on ASICs and FPGAs},
  booktitle    = {Advanced Encryption Standard - AES, 4th International Conference,
                  {AES} 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3373},
  pages        = {98--112},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11506447\_9},
  doi          = {10.1007/11506447\_9},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/PramstallerMDW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Mangard04,
  author       = {Stefan Mangard},
  editor       = {Tatsuaki Okamoto},
  title        = {Hardware Countermeasures against {DPA} ? {A} Statistical Analysis
                  of Their Effectiveness},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  pages        = {222--235},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24660-2\_18},
  doi          = {10.1007/978-3-540-24660-2\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Mangard04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OswaldMP04,
  author       = {Elisabeth Oswald and
                  Stefan Mangard and
                  Norbert Pramstaller},
  title        = {Secure and Efficient Masking of {AES} - {A} Mission Impossible?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {134},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/134},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OswaldMP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/MangardAD03,
  author       = {Stefan Mangard and
                  Manfred Josef Aigner and
                  Sandra Dominikus},
  title        = {A Highly Regular and Scalable {AES} Hardware Architecture},
  journal      = {{IEEE} Trans. Computers},
  volume       = {52},
  number       = {4},
  pages        = {483--491},
  year         = {2003},
  url          = {https://doi.org/10.1109/TC.2003.1190589},
  doi          = {10.1109/TC.2003.1190589},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/MangardAD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Mangard02,
  author       = {Stefan Mangard},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {A Simple Power-Analysis {(SPA)} Attack on Implementations of the {AES}
                  Key Expansion},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {343--358},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_24},
  doi          = {10.1007/3-540-36552-4\_24},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Mangard02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseM01,
  author       = {Giuseppe Ateniese and
                  Stefan Mangard},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {A new approach to {DNS} security {(DNSSEC)}},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {86--95},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.501996},
  doi          = {10.1145/501983.501996},
  timestamp    = {Tue, 10 Nov 2020 20:00:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AtenieseM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics