Search dblp for Publications

export results for "toc:db/books/collections/koc2009.bht:"

 download as .bib file

@incollection{DBLP:books/sp/koc09/AcicmezK09,
  author       = {Onur Acii{\c{c}}mez and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Microarchitectural Attacks and Countermeasures},
  booktitle    = {Cryptographic Engineering},
  pages        = {475--504},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_18},
  doi          = {10.1007/978-0-387-71817-0\_18},
  timestamp    = {Tue, 26 Jun 2018 16:12:55 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/AcicmezK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/BartoliniGM09,
  author       = {Sandro Bartolini and
                  Roberto Giorgi and
                  Enrico Martinelli},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Instruction Set Extensions for Cryptographic Applications},
  booktitle    = {Cryptographic Engineering},
  pages        = {191--233},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_9},
  doi          = {10.1007/978-0-387-71817-0\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/BartoliniGM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/BostonD09,
  author       = {Nigel Boston and
                  Matthew Darnall},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Elliptic and Hyperelliptic Curve Cryptography},
  booktitle    = {Cryptographic Engineering},
  pages        = {171--189},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_8},
  doi          = {10.1007/978-0-387-71817-0\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/BostonD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/ChakrabortyR09,
  author       = {Debrup Chakraborty and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Block Cipher Modes of Operation from a Hardware Implementation Perspective},
  booktitle    = {Cryptographic Engineering},
  pages        = {321--363},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_12},
  doi          = {10.1007/978-0-387-71817-0\_12},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/ChakrabortyR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/ErdemYK09,
  author       = {Serdar S{\"{u}}er Erdem and
                  Tugrul Yanik and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Fast Finite Field Multiplication},
  booktitle    = {Cryptographic Engineering},
  pages        = {75--104},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_5},
  doi          = {10.1007/978-0-387-71817-0\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/ErdemYK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/GajC09,
  author       = {Kris Gaj and
                  Pawel Chodowiec},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {{FPGA} and {ASIC} Implementations of {AES}},
  booktitle    = {Cryptographic Engineering},
  pages        = {235--294},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_10},
  doi          = {10.1007/978-0-387-71817-0\_10},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/GajC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/Joye09,
  author       = {Marc Joye},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Basics of Side-Channel Analysis},
  booktitle    = {Cryptographic Engineering},
  pages        = {365--380},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_13},
  doi          = {10.1007/978-0-387-71817-0\_13},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/Joye09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/Koc09,
  author       = {{\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {About Cryptographic Engineering},
  booktitle    = {Cryptographic Engineering},
  pages        = {1--4},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_1},
  doi          = {10.1007/978-0-387-71817-0\_1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/Koc09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/Rohatgi09,
  author       = {Pankaj Rohatgi},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Improved Techniques for Side-Channel Analysis},
  booktitle    = {Cryptographic Engineering},
  pages        = {381--406},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_14},
  doi          = {10.1007/978-0-387-71817-0\_14},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/Rohatgi09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/Rohatgi09a,
  author       = {Pankaj Rohatgi},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Electromagnetic Attacks and Countermeasures},
  booktitle    = {Cryptographic Engineering},
  pages        = {407--430},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_15},
  doi          = {10.1007/978-0-387-71817-0\_15},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/Rohatgi09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/SaldamliK09,
  author       = {G{\"{o}}kay Saldamli and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Spectral Modular Arithmetic for Cryptography},
  booktitle    = {Cryptographic Engineering},
  pages        = {125--169},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_7},
  doi          = {10.1007/978-0-387-71817-0\_7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/SaldamliK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/SavasK09,
  author       = {Erkay Savas and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Efficient Unified Arithmetic for Hardware Cryptography},
  booktitle    = {Cryptographic Engineering},
  pages        = {105--124},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_6},
  doi          = {10.1007/978-0-387-71817-0\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/SavasK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/Schindler09,
  author       = {Werner Schindler},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Random Number Generators for Cryptographic Applications},
  booktitle    = {Cryptographic Engineering},
  pages        = {5--23},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_2},
  doi          = {10.1007/978-0-387-71817-0\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/Schindler09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/Schindler09a,
  author       = {Werner Schindler},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Evaluation Criteria for Physical Random Number Generators},
  booktitle    = {Cryptographic Engineering},
  pages        = {25--54},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_3},
  doi          = {10.1007/978-0-387-71817-0\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/Schindler09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/Standaert09,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Secure and Efficient Implementation of Symmetric Encryption Schemes
                  using FPGAs},
  booktitle    = {Cryptographic Engineering},
  pages        = {295--320},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_11},
  doi          = {10.1007/978-0-387-71817-0\_11},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/koc09/Standaert09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/Sunar09,
  author       = {Berk Sunar},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {True Random Number Generators for Cryptography},
  booktitle    = {Cryptographic Engineering},
  pages        = {55--73},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_4},
  doi          = {10.1007/978-0-387-71817-0\_4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/Sunar09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/Walter09,
  author       = {Colin D. Walter},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Leakage from Montgomery Multiplication},
  booktitle    = {Cryptographic Engineering},
  pages        = {431--449},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_16},
  doi          = {10.1007/978-0-387-71817-0\_16},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/Walter09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/Walter09a,
  author       = {Colin D. Walter},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Randomized Exponentiation Algorithms},
  booktitle    = {Cryptographic Engineering},
  pages        = {451--473},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_17},
  doi          = {10.1007/978-0-387-71817-0\_17},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/Walter09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Koc2009,
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Cryptographic Engineering},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0},
  doi          = {10.1007/978-0-387-71817-0},
  isbn         = {978-0-387-71816-3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Koc2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}