default search action
Search dblp for Publications
export results for "toc:db/books/collections/koc2009.bht:"
@incollection{DBLP:books/sp/koc09/AcicmezK09, author = {Onur Acii{\c{c}}mez and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Microarchitectural Attacks and Countermeasures}, booktitle = {Cryptographic Engineering}, pages = {475--504}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_18}, doi = {10.1007/978-0-387-71817-0\_18}, timestamp = {Tue, 26 Jun 2018 16:12:55 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/AcicmezK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/BartoliniGM09, author = {Sandro Bartolini and Roberto Giorgi and Enrico Martinelli}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Instruction Set Extensions for Cryptographic Applications}, booktitle = {Cryptographic Engineering}, pages = {191--233}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_9}, doi = {10.1007/978-0-387-71817-0\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/BartoliniGM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/BostonD09, author = {Nigel Boston and Matthew Darnall}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Elliptic and Hyperelliptic Curve Cryptography}, booktitle = {Cryptographic Engineering}, pages = {171--189}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_8}, doi = {10.1007/978-0-387-71817-0\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/BostonD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/ChakrabortyR09, author = {Debrup Chakraborty and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Block Cipher Modes of Operation from a Hardware Implementation Perspective}, booktitle = {Cryptographic Engineering}, pages = {321--363}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_12}, doi = {10.1007/978-0-387-71817-0\_12}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/ChakrabortyR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/ErdemYK09, author = {Serdar S{\"{u}}er Erdem and Tugrul Yanik and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Fast Finite Field Multiplication}, booktitle = {Cryptographic Engineering}, pages = {75--104}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_5}, doi = {10.1007/978-0-387-71817-0\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/ErdemYK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/GajC09, author = {Kris Gaj and Pawel Chodowiec}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {{FPGA} and {ASIC} Implementations of {AES}}, booktitle = {Cryptographic Engineering}, pages = {235--294}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_10}, doi = {10.1007/978-0-387-71817-0\_10}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/GajC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/Joye09, author = {Marc Joye}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Basics of Side-Channel Analysis}, booktitle = {Cryptographic Engineering}, pages = {365--380}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_13}, doi = {10.1007/978-0-387-71817-0\_13}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/Joye09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/Koc09, author = {{\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {About Cryptographic Engineering}, booktitle = {Cryptographic Engineering}, pages = {1--4}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_1}, doi = {10.1007/978-0-387-71817-0\_1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/Koc09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/Rohatgi09, author = {Pankaj Rohatgi}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Improved Techniques for Side-Channel Analysis}, booktitle = {Cryptographic Engineering}, pages = {381--406}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_14}, doi = {10.1007/978-0-387-71817-0\_14}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/Rohatgi09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/Rohatgi09a, author = {Pankaj Rohatgi}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Electromagnetic Attacks and Countermeasures}, booktitle = {Cryptographic Engineering}, pages = {407--430}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_15}, doi = {10.1007/978-0-387-71817-0\_15}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/Rohatgi09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/SaldamliK09, author = {G{\"{o}}kay Saldamli and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Spectral Modular Arithmetic for Cryptography}, booktitle = {Cryptographic Engineering}, pages = {125--169}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_7}, doi = {10.1007/978-0-387-71817-0\_7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/SaldamliK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/SavasK09, author = {Erkay Savas and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Efficient Unified Arithmetic for Hardware Cryptography}, booktitle = {Cryptographic Engineering}, pages = {105--124}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_6}, doi = {10.1007/978-0-387-71817-0\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/SavasK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/Schindler09, author = {Werner Schindler}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Random Number Generators for Cryptographic Applications}, booktitle = {Cryptographic Engineering}, pages = {5--23}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_2}, doi = {10.1007/978-0-387-71817-0\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/Schindler09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/Schindler09a, author = {Werner Schindler}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Evaluation Criteria for Physical Random Number Generators}, booktitle = {Cryptographic Engineering}, pages = {25--54}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_3}, doi = {10.1007/978-0-387-71817-0\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/Schindler09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/Standaert09, author = {Fran{\c{c}}ois{-}Xavier Standaert}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs}, booktitle = {Cryptographic Engineering}, pages = {295--320}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_11}, doi = {10.1007/978-0-387-71817-0\_11}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/koc09/Standaert09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/Sunar09, author = {Berk Sunar}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {True Random Number Generators for Cryptography}, booktitle = {Cryptographic Engineering}, pages = {55--73}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_4}, doi = {10.1007/978-0-387-71817-0\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/Sunar09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/Walter09, author = {Colin D. Walter}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Leakage from Montgomery Multiplication}, booktitle = {Cryptographic Engineering}, pages = {431--449}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_16}, doi = {10.1007/978-0-387-71817-0\_16}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/Walter09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/Walter09a, author = {Colin D. Walter}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Randomized Exponentiation Algorithms}, booktitle = {Cryptographic Engineering}, pages = {451--473}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_17}, doi = {10.1007/978-0-387-71817-0\_17}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/Walter09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Koc2009, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Cryptographic Engineering}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0}, doi = {10.1007/978-0-387-71817-0}, isbn = {978-0-387-71816-3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Koc2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.