Side-channel attack

Results: 129



#Item
21ISCOn Security of a White-Box Implementation of SHARK  Yang SHI and Hongfei FAN

ISCOn Security of a White-Box Implementation of SHARK Yang SHI and Hongfei FAN

Add to Reading List

Source URL: isc2015.item.ntnu.no

Language: English - Date: 2015-09-20 14:17:24
22Low-Cost Software Countermeasures Against Fault Attacks: Implementation and Performances Trade Offs Alessandro Barenghi Luca Breveglieri

Low-Cost Software Countermeasures Against Fault Attacks: Implementation and Performances Trade Offs Alessandro Barenghi Luca Breveglieri

Add to Reading List

Source URL: euler.ecs.umass.edu

Language: English - Date: 2011-03-24 10:57:36
23FCS 2013 Workshop on Foundations of Computer Security (Informal Proceedings) June 29, 2013 Tulane University

FCS 2013 Workshop on Foundations of Computer Security (Informal Proceedings) June 29, 2013 Tulane University

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2013-06-11 09:16:04
24main_CameraReadyFormatting.dvi

main_CameraReadyFormatting.dvi

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2012-05-14 19:11:08
25Cross-Tenant Side-Channel Attacks in PaaS Clouds Yinqian Zhang Ari Juels  University of North Carolina

Cross-Tenant Side-Channel Attacks in PaaS Clouds Yinqian Zhang Ari Juels University of North Carolina

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2014-12-20 11:41:32
26Real world AES key extraction  CHES-2010 Rump Session, Santa Barbara, USA, 19 August 2010 Real world AES key extraction Sergei Skorobogatov

Real world AES key extraction CHES-2010 Rump Session, Santa Barbara, USA, 19 August 2010 Real world AES key extraction Sergei Skorobogatov

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2010-09-09 06:37:08
27CHAPTER  17 Emission Security The hum of either army stilly sounds, That the fixed sentinels almost receive

CHAPTER 17 Emission Security The hum of either army stilly sounds, That the fixed sentinels almost receive

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:50:25
28HOST-2010 3rd Annual IEEE International Symposium on Hardware-Oriented Security and Trust June 13-14, 2010 – Anaheim Convention Center, Anaheim, CA  Sunday, June 13th

HOST-2010 3rd Annual IEEE International Symposium on Hardware-Oriented Security and Trust June 13-14, 2010 – Anaheim Convention Center, Anaheim, CA Sunday, June 13th

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2010-10-16 10:23:01
29ODETTE: A Non-Scan Design-for-Test Methodology for Trojan Detection in ICs M. Banga and M. Hsiao (Virginia Tech) 11:45 - 1:00: Lunch 1:00 - 2:00: Poster Session Session Chair: Patrick Schaumont

ODETTE: A Non-Scan Design-for-Test Methodology for Trojan Detection in ICs M. Banga and M. Hsiao (Virginia Tech) 11:45 - 1:00: Lunch 1:00 - 2:00: Poster Session Session Chair: Patrick Schaumont

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2011-05-27 10:02:27
30Microsoft Word - HOST2015_Program_v10.docx

Microsoft Word - HOST2015_Program_v10.docx

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2015-05-05 13:55:29