Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 207 matches
- 2024
- Javad Bahrami, Mohammad Ebrahimabadi, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Impact of Process Mismatch and Device Aging on SR-Latch Based True Random Number Generators. COSADE 2024: 177-196 - Nicolas Belleville, Loïc Masure:
Combining Loop Shuffling and Code PolyMorphism for Enhanced AES Side-Channel Security. COSADE 2024: 260-280 - Baris Ege, Bob Swinkels, Dilara Toprakhisar, Praveen Kumar Vadnala:
Practical Improvements to Statistical Ineffective Fault Attacks. COSADE 2024: 59-75 - Rikuu Hasegawa, Kazuki Monta, Takuya Wadatsumi, Takuji Miki, Makoto Nagata:
On-Chip Evaluation of Voltage Drops and Fault Occurrence Induced by Si Backside EM Injection. COSADE 2024: 22-37 - Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya:
EFFLUX-F2: A High Performance Hardware Security Evaluation Board. COSADE 2024: 38-56 - Patrick Karl, Jonas Schupp, Georg Sigl:
The Impact of Hash Primitives and Communication Overhead for Hardware-Accelerated SPHINCS+. COSADE 2024: 221-239 - Mustafa Khairallah, Srinivasan Yadhunathan, Shivam Bhasin:
Lightweight Leakage-Resilient PRNG from TBCs Using Superposition. COSADE 2024: 197-217 - Amélie Marotta, Ronan Lashermes, Guillaume Bouffard, Olivier Sentieys, Rachid Dafali:
Characterizing and Modeling Synchronous Clock-Glitch Fault Injection. COSADE 2024: 3-21 - Thomas Marquet, Elisabeth Oswald:
Exploring Multi-task Learning in the Context of Masked AES Implementations. COSADE 2024: 93-112 - Ioana Savu, Marina Krcek, Guilherme Perin, Lichao Wu, Stjepan Picek:
The Need for MORE: Unsupervised Side-Channel Analysis with Single Network Training and Multi-output Regression. COSADE 2024: 113-132 - Oussama Sayari, Soundes Marzougui, Thomas Aulbach, Juliane Krämer, Jean-Pierre Seifert:
HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme. COSADE 2024: 240-259 - Fabian Schmid, Shibam Mukherjee, Stjepan Picek, Marc Stöttinger, Fabrizio De Santis, Christian Rechberger:
Towards Private Deep Learning-Based Side-Channel Analysis Using Homomorphic Encryption - Opportunities and Limitations. COSADE 2024: 133-154 - Niklas Stein, Michael Pehl:
Leakage Sources of the ICLooPUF: Analysis of a Side-Channel Protected Oscillator-Based PUF. COSADE 2024: 157-176 - Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov:
CAPABARA: A Combined Attack on CAPA. COSADE 2024: 76-89 - Romain Wacquez, Naofumi Homma:
Constructive Side-Channel Analysis and Secure Design - 15th International Workshop, COSADE 2024, Gardanne, France, April 9-10, 2024, Proceedings. Lecture Notes in Computer Science 14595, Springer 2024, ISBN 978-3-031-57542-6 [contents] - 2023
- Shashank Agrawal, Estuardo Alpirez Bock, Yilei Chen, Gaven J. Watson:
White-Box Cryptography with Global Device Binding from Message-Recoverable Signatures and Token-Based Obfuscation. COSADE 2023: 241-261 - Julien Béguinot, Wei Cheng, Sylvain Guilley, Yi Liu, Loïc Masure, Olivier Rioul, François-Xavier Standaert:
Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings. COSADE 2023: 86-104 - Daniele Antonio Emanuele Carta, Vittorio Zaccaria, Gabriele Quagliarella, Maria Chiara Molteni:
Efficient Attack-Surface Exploration for Electromagnetic Fault Injection. COSADE 2023: 23-41 - Antoine Gicquel, Damien Hardy, Karine Heydemann, Erven Rohou:
SAMVA: Static Analysis for Multi-fault Attack Paths Determination. COSADE 2023: 3-22 - Vincent Grosso, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi:
Punctured Syndrome Decoding Problem - Efficient Side-Channel Attacks Against Classic McEliece. COSADE 2023: 170-192 - Daniel Heinz, Gabi Dreo Rodosek:
Fast First-Order Masked NTTRU. COSADE 2023: 127-148 - Tobias Holl, Katharina Bogad, Michael Gruber:
Whiteboxgrind - Automated Analysis of Whitebox Cryptography. COSADE 2023: 221-240 - Soundes Marzougui, Ievgen Kabin, Juliane Krämer, Thomas Aulbach, Jean-Pierre Seifert:
On the Feasibility of Single-Trace Attacks on the Gaussian Sampler Using a CDT. COSADE 2023: 149-169 - Aein Rezaei Shahmirzadi, Thorben Moos, Amir Moradi:
Energy Consumption of Protected Cryptographic Hardware Cores - An Experimental Study. COSADE 2023: 195-220 - Dillibabu Shanmugam, Patrick Schaumont:
Improving Side-channel Leakage Assessment Using Pre-silicon Leakage Models. COSADE 2023: 105-124 - Emanuele Strieder, Manuel Ilg, Johann Heyszl, Florian Unterstein, Silvan Streit:
ASCA vs. SASCA - A Closer Look at the AES Key Schedule. COSADE 2023: 65-85 - Anthony Zgheib, Olivier Potin, Jean-Baptiste Rigaud, Jean-Max Dutertre:
A CCFI Verification Scheme Based on the RISC-V Trace Encoder. COSADE 2023: 42-61 - Elif Bilge Kavun, Michael Pehl:
Constructive Side-Channel Analysis and Secure Design - 14th International Workshop, COSADE 2023, Munich, Germany, April 3-4, 2023, Proceedings. Lecture Notes in Computer Science 13979, Springer 2023, ISBN 978-3-031-29496-9 [contents] - 2022
- Melissa Azouaoui, Olivier Bronchain, Clément Hoffmann, Yulia Kuzovkova, Tobias Schneider, François-Xavier Standaert:
Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber. COSADE 2022: 236-256 - Arthur Beckers, Lennert Wouters, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede:
Provable Secure Software Masking in the Real-World. COSADE 2022: 215-235
skipping 177 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-08-21 07:40 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint