Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/series/isc/isc364229655.bht:"
@incollection{DBLP:series/isc/AkdemirWKS12, author = {Kahraman D. Akdemir and Zhen Wang and Mark G. Karpovsky and Berk Sunar}, editor = {Marc Joye and Michael Tunstall}, title = {Design of Cryptographic Devices Resilient to Fault Injection Attacks Using Nonlinear Robust Codes}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {171--199}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_11}, doi = {10.1007/978-3-642-29656-7\_11}, timestamp = {Fri, 27 Mar 2020 08:31:50 +0100}, biburl = {https://dblp.org/rec/series/isc/AkdemirWKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/AlkhoraidlyDH12, author = {Abdulaziz Alkhoraidly and Agustin Dominguez{-}Oviedo and M. Anwar Hasan}, editor = {Marc Joye and Michael Tunstall}, title = {Fault Attacks on Elliptic Curve Cryptosystems}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {137--155}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_9}, doi = {10.1007/978-3-642-29656-7\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/AlkhoraidlyDH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/BarenghiBBPP12, author = {Alessandro Barenghi and Guido Marco Bertoni and Luca Breveglieri and Mauro Pellicioli and Gerardo Pelosi}, editor = {Marc Joye and Michael Tunstall}, title = {Injection Technologies for Fault Attacks on Microprocessors}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {275--293}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_16}, doi = {10.1007/978-3-642-29656-7\_16}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/BarenghiBBPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/BarenghiT12, author = {Alessandro Barenghi and Elena Trichina}, editor = {Marc Joye and Michael Tunstall}, title = {Fault Attacks on Stream Ciphers}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {239--255}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_14}, doi = {10.1007/978-3-642-29656-7\_14}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/BarenghiT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/BerzatiCG12, author = {Alexandre Berzati and C{\'{e}}cile Canovas{-}Dumas and Louis Goubin}, editor = {Marc Joye and Michael Tunstall}, title = {A Survey of Differential Fault Analysis Against Classical {RSA} Implementations}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {111--124}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_7}, doi = {10.1007/978-3-642-29656-7\_7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/BerzatiCG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/BousselamNFR12, author = {Kaouthar Bousselam and Giorgio Di Natale and Marie{-}Lise Flottes and Bruno Rouzeyre}, editor = {Marc Joye and Michael Tunstall}, title = {On Countermeasures Against Fault Attacks on the Advanced Encryption Standard}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {89--108}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_6}, doi = {10.1007/978-3-642-29656-7\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/BousselamNFR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Clavier12, author = {Christophe Clavier}, editor = {Marc Joye and Michael Tunstall}, title = {Attacking Block Ciphers}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {19--35}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_2}, doi = {10.1007/978-3-642-29656-7\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Clavier12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Giraud12, author = {Christophe Giraud}, editor = {Marc Joye and Michael Tunstall}, title = {Differential Fault Analysis of the Advanced Encryption Standard}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {55--72}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_4}, doi = {10.1007/978-3-642-29656-7\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Giraud12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/GuilleyD12, author = {Sylvain Guilley and Jean{-}Luc Danger}, editor = {Marc Joye and Michael Tunstall}, title = {Global Faults on Cryptographic Circuits}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {295--311}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_17}, doi = {10.1007/978-3-642-29656-7\_17}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/GuilleyD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/HaririR12, author = {Arash Hariri and Arash Reyhani{-}Masoleh}, editor = {Marc Joye and Michael Tunstall}, title = {On Countermeasures Against Fault Attacks on Elliptic Curve Cryptography Using Fault Detection}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {157--169}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_10}, doi = {10.1007/978-3-642-29656-7\_10}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/HaririR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/KimQ12, author = {Chong Hee Kim and Jean{-}Jacques Quisquater}, editor = {Marc Joye and Michael Tunstall}, title = {Fault Attacks Against {RSA-CRT} Implementation}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {125--136}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_8}, doi = {10.1007/978-3-642-29656-7\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/KimQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/MrabetPV12, author = {Nadia El Mrabet and Dan Page and Frederik Vercauteren}, editor = {Marc Joye and Michael Tunstall}, title = {Fault Attacks on Pairing-Based Cryptography}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {221--236}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_13}, doi = {10.1007/978-3-642-29656-7\_13}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/MrabetPV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/NguyenT12, author = {Phong Q. Nguyen and Mehdi Tibouchi}, editor = {Marc Joye and Michael Tunstall}, title = {Lattice-Based Fault Attacks on Signatures}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {201--220}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_12}, doi = {10.1007/978-3-642-29656-7\_12}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/NguyenT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/OswaldS12, author = {Elisabeth Oswald and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Marc Joye and Michael Tunstall}, title = {Side-Channel Analysis and Its Relevance to Fault Attacks}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {3--15}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_1}, doi = {10.1007/978-3-642-29656-7\_1}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/OswaldS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/RegazzoniBIK12, author = {Francesco Regazzoni and Luca Breveglieri and Paolo Ienne and Israel Koren}, editor = {Marc Joye and Michael Tunstall}, title = {Interaction Between Fault Attack Countermeasures and the Resistance Against Power Analysis Attacks}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {257--272}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_15}, doi = {10.1007/978-3-642-29656-7\_15}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/RegazzoniBIK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Rivain12, author = {Matthieu Rivain}, editor = {Marc Joye and Michael Tunstall}, title = {Differential Fault Analysis of {DES}}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {37--54}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_3}, doi = {10.1007/978-3-642-29656-7\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Rivain12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/SchmidtM12, author = {J{\"{o}}rn{-}Marc Schmidt and Marcel Medwed}, editor = {Marc Joye and Michael Tunstall}, title = {Countermeasures for Symmetric Key Ciphers}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {73--87}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_5}, doi = {10.1007/978-3-642-29656-7\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/SchmidtM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/TakahashiFGLSO12, author = {Junko Takahashi and Toshinori Fukunaga and Shigeto Gomisawa and Yang Li and Kazuo Sakiyama and Kazuo Ohta}, editor = {Marc Joye and Michael Tunstall}, title = {Fault Injection and Key Retrieval Experiments on an Evaluation Board}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {313--331}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_18}, doi = {10.1007/978-3-642-29656-7\_18}, timestamp = {Thu, 22 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/TakahashiFGLSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/364229655, editor = {Marc Joye and Michael Tunstall}, title = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7}, doi = {10.1007/978-3-642-29656-7}, isbn = {978-3-642-29655-0}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/364229655.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.