![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
29. Krypto-Tag 2018: Renningen, Germany
- Christopher Huth, Michael Nüsken:
29. Krypto-Tag, Renningen, Germany, September 6-7, 2018. Gesellschaft für Informatik e.V. / FG KRYPTO 2018 - Daniel Günther:
Private Function Evalutation with Universal Circuits. - Andreas Schaffhauser:
Algebraic Analysis of the Initialization Phase Grain Version 1 using a Degree-Oriented Interpolation Technique. - Patrick Struck:
Challenges in Post-Quantum Security Reductions. - Markus Klingenstein, Marcel Kneib:
Hardware Accelerated Sender Identification for the Controller Area Network. - Oleg Schell, Marcel Kneib:
Machine Learning Based Sender Identification for Controller Area Network. - Virginie Lallemand, Gregor Leander, Patrick Neumann, Friedrich Wiemer:
BISON - Instantiating the Whitened Swap-Or-Not Construction. - Dan Kreiser, Zoya Dyka, Ievgen Kabin, Peter Langendörfer:
HCCA against Montgomery kP Design. - Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Comments On: Constant Time Modular Inversion. - Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Low-Cost Countermeasure against Horizontal Bus and Address-Bit SCA. - Christian Wittke, Zoya Dyka, Peter Langendörfer:
Placement of Gates in ECC Designs. - Dmytro Petryk, Zoya Dyka, Peter Langendörfer:
Optical Fault Injections: Most Often Used Setups. - Eike Stadtländer, Michael Nüsken:
Automatic Security Analysis in the Symbolic Model using Tamarin-Prover. - Jakob Nussbaumer, Michael Nüsken:
Cryptographic Game-style language in EasyCrypt. - Daniel Rausch:
Universal Composability: A Comparison of Different Models. - Nikolaos P. Karvelas, Amos Treiber, Stefan Katzenbeisser:
Examining Leakage from Access Counts in ORAM Constructions. - Oleksandr Tkachenko:
Privacy-Preserving Genomics on a Large Scale. - Marcel Fourné:
Can Verification of Cryptographic Libraries be liberated from the von Neumann Style?
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.