Search dblp for Publications

export results for "toc:db/conf/host/host2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/host/AkkayaECM15,
  author       = {Nail Etkin Can Akkaya and
                  Burak Erbagci and
                  Raymond Carley and
                  Ken Mai},
  title        = {A DPA-resistant self-timed three-phase dual-rail pre-charge logic
                  family},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {112--117},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140248},
  doi          = {10.1109/HST.2015.7140248},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/AkkayaECM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/BaoXS15,
  author       = {Chongxi Bao and
                  Yang Xie and
                  Ankur Srivastava},
  title        = {A security-aware design scheme for better hardware Trojan detection
                  sensitivity},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {52--55},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140236},
  doi          = {10.1109/HST.2015.7140236},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/BaoXS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/BeckerWG15,
  author       = {Georg T. Becker and
                  Alexander Wild and
                  Tim G{\"{u}}neysu},
  title        = {Security analysis of index-based syndrome coding for PUF-based key
                  generation},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {20--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140230},
  doi          = {10.1109/HST.2015.7140230},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/BeckerWG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/BhargavaSM15,
  author       = {Mudit Bhargava and
                  Kaship Sheikh and
                  Ken Mai},
  title        = {Robust true random number generator using hot-carrier injection balanced
                  metastable sense amplifiers},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {7--13},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140228},
  doi          = {10.1109/HST.2015.7140228},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/BhargavaSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/BidmeshkiM15,
  author       = {Mohammad{-}Mahdi Bidmeshki and
                  Yiorgos Makris},
  title        = {Toward automatic proof generation for information flow policies in
                  third-party hardware {IP}},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {163--168},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140256},
  doi          = {10.1109/HST.2015.7140256},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/BidmeshkiM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/BloomNSNL15,
  author       = {Gedare Bloom and
                  Bhagirath Narahari and
                  Rahul Simha and
                  Ali Namazi and
                  Renato Levy},
  title        = {{FPGA} SoC architecture and runtime to prevent hardware Trojans from
                  leaking secrets},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {48--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140235},
  doi          = {10.1109/HST.2015.7140235},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/BloomNSNL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/ChakrabortyMM15,
  author       = {Abhishek Chakraborty and
                  Bodhisatwa Mazumdar and
                  Debdeep Mukhopadhyay},
  title        = {A practical {DPA} on Grain v1 using {LS-SVM}},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {44--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140234},
  doi          = {10.1109/HST.2015.7140234},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/ChakrabortyMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/ChenFLCCY15,
  author       = {Pai{-}Yu Chen and
                  Runchen Fang and
                  Rui Liu and
                  Chaitali Chakrabarti and
                  Yu Cao and
                  Shimeng Yu},
  title        = {Exploiting resistive cross-point array for compact design of physical
                  unclonable function},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {26--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140231},
  doi          = {10.1109/HST.2015.7140231},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/ChenFLCCY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/ExurvilleZRR15,
  author       = {Ingrid Exurville and
                  Lo{\"{\i}}c Zussa and
                  Jean{-}Baptiste Rigaud and
                  Bruno Robisson},
  title        = {Resilient hardware Trojans detection based on path delay measurements},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {151--156},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140254},
  doi          = {10.1109/HST.2015.7140254},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/ExurvilleZRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/GhoshC15,
  author       = {Shamit Ghosh and
                  Dipanwita Roy Chowdhury},
  title        = {Preventing fault attack on stream cipher using randomization},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {88--91},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140243},
  doi          = {10.1109/HST.2015.7140243},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/GhoshC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/GilmoreHO15,
  author       = {Richard Gilmore and
                  Neil Hanley and
                  M{\'{a}}ire O'Neill},
  title        = {Neural network based attack on a masked implementation of {AES}},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {106--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140247},
  doi          = {10.1109/HST.2015.7140247},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/GilmoreHO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/GoddardLE15,
  author       = {Zachary N. Goddard and
                  Nicholas LaJeunesse and
                  Thomas Eisenbarth},
  title        = {Power analysis of the t-private logic style for FPGAs},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {68--71},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140239},
  doi          = {10.1109/HST.2015.7140239},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/GoddardLE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/GuoKRJK15,
  author       = {Xiaofei Guo and
                  Naghmeh Karimi and
                  Francesco Regazzoni and
                  Chenglu Jin and
                  Ramesh Karri},
  title        = {Simulation and analysis of negative-bias temperature instability aging
                  on power analysis attacks},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {124--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140250},
  doi          = {10.1109/HST.2015.7140250},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/GuoKRJK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/HorstmeyerARY15,
  author       = {Roarke Horstmeyer and
                  Sid Assawaworrarit and
                  Ulrich R{\"{u}}hrmair and
                  Changhuei Yang},
  title        = {Physically secure and fully reconfigurable data storage using optical
                  scattering},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {157--162},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140255},
  doi          = {10.1109/HST.2015.7140255},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/HorstmeyerARY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/LinG15,
  author       = {Cheng{-}Wei Lin and
                  Swaroop Ghosh},
  title        = {A family of Schmitt-Trigger-based arbiter-PUFs and selective challenge-pruning
                  for robustness and quality},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {32--37},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140232},
  doi          = {10.1109/HST.2015.7140232},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/LinG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/NgoBDGN15,
  author       = {Xuan Thuy Ngo and
                  Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {Linear complementary dual code improvement to strengthen encoded circuit
                  against hardware Trojan horses},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {82--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140242},
  doi          = {10.1109/HST.2015.7140242},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/NgoBDGN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/OteroTKHM15,
  author       = {Carlos Tadeo Ortega Otero and
                  Jonathan Tse and
                  Robert Karmazin and
                  Benjamin Hill and
                  Rajit Manohar},
  title        = {Automatic obfuscated cell layout for trusted split-foundry design},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {56--61},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140237},
  doi          = {10.1109/HST.2015.7140237},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/OteroTKHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/PapadimitriouTH15,
  author       = {Athanasios Papadimitriou and
                  Marios Tampas and
                  David H{\'{e}}ly and
                  Vincent Beroulle and
                  Paolo Maistri and
                  R{\'{e}}gis Leveugle},
  title        = {Validation of {RTL} laser fault injection model with respect to layout
                  information},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {78--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140241},
  doi          = {10.1109/HST.2015.7140241},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/PapadimitriouTH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/RaoKRBP15,
  author       = {Sushmita Kadiyala Rao and
                  Deepak Krishnankutty and
                  Ryan W. Robucci and
                  Nilanjan Banerjee and
                  Chintan Patel},
  title        = {Post-layout estimation of side-channel power supply signatures},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {92--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140244},
  doi          = {10.1109/HST.2015.7140244},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/RaoKRBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/RiviereNRDBS15,
  author       = {Lionel Rivi{\`{e}}re and
                  Zakaria Najm and
                  Pablo Rauzy and
                  Jean{-}Luc Danger and
                  Julien Bringer and
                  Laurent Sauvage},
  title        = {High precision fault injections on the instruction cache of ARMv7-M
                  architectures},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {62--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140238},
  doi          = {10.1109/HST.2015.7140238},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/RiviereNRDBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/SahaC15,
  author       = {Dhiman Saha and
                  Dipanwita Roy Chowdhury},
  title        = {Diagonal fault analysis of Gr{\(\oslash\)}stl in dedicated {MAC} mode},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {100--105},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140246},
  doi          = {10.1109/HST.2015.7140246},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/SahaC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/SasdrichMMG15,
  author       = {Pascal Sasdrich and
                  Amir Moradi and
                  Oliver Mischke and
                  Tim G{\"{u}}neysu},
  title        = {Achieving side-channel protection with dynamic logic reconfiguration
                  on modern FPGAs},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {130--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140251},
  doi          = {10.1109/HST.2015.7140251},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/SasdrichMMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/ShahverdiTE15,
  author       = {Aria Shahverdi and
                  Mostafa Taha and
                  Thomas Eisenbarth},
  title        = {Silent Simon: {A} threshold implementation under 100 slices},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140227},
  doi          = {10.1109/HST.2015.7140227},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/ShahverdiTE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/SubramanyanRM15,
  author       = {Pramod Subramanyan and
                  Sayak Ray and
                  Sharad Malik},
  title        = {Evaluating the security of logic encryption algorithms},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {137--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140252},
  doi          = {10.1109/HST.2015.7140252},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/SubramanyanRM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/WangWWQZ15,
  author       = {Qian Wang and
                  An Wang and
                  Liji Wu and
                  Gang Qu and
                  Guoshuang Zhang},
  title        = {Template attack on masking {AES} based on fault sensitivity analysis},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {96--99},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140245},
  doi          = {10.1109/HST.2015.7140245},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/WangWWQZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/WilcoxSP15,
  author       = {I. Wilcox and
                  Fareena Saqib and
                  James F. Plusquellic},
  title        = {{GDS-II} Trojan detection using multiple supply pad {VDD} and {GND}
                  IDDQs in {ASIC} functional units},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {144--150},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140253},
  doi          = {10.1109/HST.2015.7140253},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/WilcoxSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/XiaoFT15,
  author       = {Kan Xiao and
                  Domenic Forte and
                  Mark M. Tehranipoor},
  title        = {Efficient and secure split manufacturing via obfuscated built-in self-authentication},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {14--19},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140229},
  doi          = {10.1109/HST.2015.7140229},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/XiaoFT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/YuHD15,
  author       = {Meng{-}Day (Mandel) Yu and
                  Matthias Hiller and
                  Srinivas Devadas},
  title        = {Maximum-likelihood decoding of device-specific multi-bit symbols for
                  reliable key generation},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {38--43},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140233},
  doi          = {10.1109/HST.2015.7140233},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/YuHD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/YuceGS15,
  author       = {Bilgiday Yuce and
                  Nahid Farhady Ghalaty and
                  Patrick Schaumont},
  title        = {{TVVF:} Estimating the vulnerability of hardware cryptosystems against
                  timing violation attacks},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {72--77},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140240},
  doi          = {10.1109/HST.2015.7140240},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/YuceGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/ZhangDFL15,
  author       = {Liwei Zhang and
                  A. Adam Ding and
                  Yunsi Fei and
                  Pei Luo},
  title        = {Efficient 2nd-order power analysis on masked devices utilizing multiple
                  leakage},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {118--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140249},
  doi          = {10.1109/HST.2015.7140249},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/ZhangDFL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/host/2015,
  title        = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7119893/proceeding},
  isbn         = {978-1-4673-7420-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics