default search action
CS2@HiPEAC 2014: Vienna, Austria
- Jens Knoop, Valentina Salapura, Israel Koren, Gerardo Pelosi:
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014. ACM 2014, ISBN 978-1-4503-2484-7 - Kamil Gomina, Philippe Gendrier, Philippe Candelier, Jean-Baptiste Rigaud, Assia Tria:
Detecting positive voltage attacks on CMOS circuits. 1-6 - Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Youssef Souissi:
High-order timing attacks. 7-12 - Stjepan Picek, Baris Ege, Lejla Batina, Domagoj Jakobovic, Lukasz Chmielewski, Marin Golub:
On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box. 13-18 - Michael Lackner, Reinhard Berlach, Reinhold Weiss, Christian Steger:
Countering type confusion and buffer overflow attacks on Java smart cards by data type sensitive obfuscation. 19-24 - Pierre Schnarz, Joachim Wietzke, Ingo Stengel:
Towards attacks on restricted memory areas through co-processors in embedded multi-OS environments via malicious firmware injection. 25-30 - Raphael Spreitzer, Jörn-Marc Schmidt:
Group-signature schemes on constrained devices: the gap between theory and practice. 31-36 - Reinhard Berlach, Michael Lackner, Christian Steger, Johannes Loinig, Ernst Haselsteiner:
Memory-efficient on-card byte code verification for Java cards. 37-40 - Robert M. Seepers, Christos Strydis, Ioannis Sourdis, Chris I. De Zeeuw:
Adaptive entity-identifier generation for IMD emergency access. 41-44 - Vishal Saraswat, Daniel Feldman, Denis Foo Kune, Satyajit Das:
Remote cache-timing attacks against AES. 45-48
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.