Search dblp for Publications

export results for "toc:db/series/isc/isc364229655.bht:"

 download as .bib file

@incollection{DBLP:series/isc/AkdemirWKS12,
  author       = {Kahraman D. Akdemir and
                  Zhen Wang and
                  Mark G. Karpovsky and
                  Berk Sunar},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Design of Cryptographic Devices Resilient to Fault Injection Attacks
                  Using Nonlinear Robust Codes},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {171--199},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_11},
  doi          = {10.1007/978-3-642-29656-7\_11},
  timestamp    = {Fri, 27 Mar 2020 08:31:50 +0100},
  biburl       = {https://dblp.org/rec/series/isc/AkdemirWKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/AlkhoraidlyDH12,
  author       = {Abdulaziz Alkhoraidly and
                  Agustin Dominguez{-}Oviedo and
                  M. Anwar Hasan},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Fault Attacks on Elliptic Curve Cryptosystems},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {137--155},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_9},
  doi          = {10.1007/978-3-642-29656-7\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/AlkhoraidlyDH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/BarenghiBBPP12,
  author       = {Alessandro Barenghi and
                  Guido Marco Bertoni and
                  Luca Breveglieri and
                  Mauro Pellicioli and
                  Gerardo Pelosi},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Injection Technologies for Fault Attacks on Microprocessors},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {275--293},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_16},
  doi          = {10.1007/978-3-642-29656-7\_16},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/BarenghiBBPP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/BarenghiT12,
  author       = {Alessandro Barenghi and
                  Elena Trichina},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Fault Attacks on Stream Ciphers},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {239--255},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_14},
  doi          = {10.1007/978-3-642-29656-7\_14},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/BarenghiT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/BerzatiCG12,
  author       = {Alexandre Berzati and
                  C{\'{e}}cile Canovas{-}Dumas and
                  Louis Goubin},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {A Survey of Differential Fault Analysis Against Classical {RSA} Implementations},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {111--124},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_7},
  doi          = {10.1007/978-3-642-29656-7\_7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/BerzatiCG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/BousselamNFR12,
  author       = {Kaouthar Bousselam and
                  Giorgio Di Natale and
                  Marie{-}Lise Flottes and
                  Bruno Rouzeyre},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {On Countermeasures Against Fault Attacks on the Advanced Encryption
                  Standard},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {89--108},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_6},
  doi          = {10.1007/978-3-642-29656-7\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/BousselamNFR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Clavier12,
  author       = {Christophe Clavier},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Attacking Block Ciphers},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {19--35},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_2},
  doi          = {10.1007/978-3-642-29656-7\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Clavier12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Giraud12,
  author       = {Christophe Giraud},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Differential Fault Analysis of the Advanced Encryption Standard},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {55--72},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_4},
  doi          = {10.1007/978-3-642-29656-7\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Giraud12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/GuilleyD12,
  author       = {Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Global Faults on Cryptographic Circuits},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {295--311},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_17},
  doi          = {10.1007/978-3-642-29656-7\_17},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/GuilleyD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/HaririR12,
  author       = {Arash Hariri and
                  Arash Reyhani{-}Masoleh},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {On Countermeasures Against Fault Attacks on Elliptic Curve Cryptography
                  Using Fault Detection},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {157--169},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_10},
  doi          = {10.1007/978-3-642-29656-7\_10},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/HaririR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/KimQ12,
  author       = {Chong Hee Kim and
                  Jean{-}Jacques Quisquater},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Fault Attacks Against {RSA-CRT} Implementation},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {125--136},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_8},
  doi          = {10.1007/978-3-642-29656-7\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/KimQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/MrabetPV12,
  author       = {Nadia El Mrabet and
                  Dan Page and
                  Frederik Vercauteren},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Fault Attacks on Pairing-Based Cryptography},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {221--236},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_13},
  doi          = {10.1007/978-3-642-29656-7\_13},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/MrabetPV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/NguyenT12,
  author       = {Phong Q. Nguyen and
                  Mehdi Tibouchi},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Lattice-Based Fault Attacks on Signatures},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {201--220},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_12},
  doi          = {10.1007/978-3-642-29656-7\_12},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/NguyenT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/OswaldS12,
  author       = {Elisabeth Oswald and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Side-Channel Analysis and Its Relevance to Fault Attacks},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_1},
  doi          = {10.1007/978-3-642-29656-7\_1},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/OswaldS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/RegazzoniBIK12,
  author       = {Francesco Regazzoni and
                  Luca Breveglieri and
                  Paolo Ienne and
                  Israel Koren},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Interaction Between Fault Attack Countermeasures and the Resistance
                  Against Power Analysis Attacks},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {257--272},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_15},
  doi          = {10.1007/978-3-642-29656-7\_15},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/RegazzoniBIK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Rivain12,
  author       = {Matthieu Rivain},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Differential Fault Analysis of {DES}},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {37--54},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_3},
  doi          = {10.1007/978-3-642-29656-7\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Rivain12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/SchmidtM12,
  author       = {J{\"{o}}rn{-}Marc Schmidt and
                  Marcel Medwed},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Countermeasures for Symmetric Key Ciphers},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {73--87},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_5},
  doi          = {10.1007/978-3-642-29656-7\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/SchmidtM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/TakahashiFGLSO12,
  author       = {Junko Takahashi and
                  Toshinori Fukunaga and
                  Shigeto Gomisawa and
                  Yang Li and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Fault Injection and Key Retrieval Experiments on an Evaluation Board},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {313--331},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_18},
  doi          = {10.1007/978-3-642-29656-7\_18},
  timestamp    = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/TakahashiFGLSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/364229655,
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7},
  doi          = {10.1007/978-3-642-29656-7},
  isbn         = {978-3-642-29655-0},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/364229655.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics