Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 34 matches
- 2011
- Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, Bo-Yin Yang:
High-Speed High-Security Signatures. CHES 2011: 124-142 - Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede:
spongent: A Lightweight Hash Function. CHES 2011: 312-325 - Joppe W. Bos, Onur Özen, Martijn Stam:
Efficient Hashing Using the AES Instruction Set. CHES 2011: 507-522 - Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi Tibouchi:
Modulus Fault Attacks against RSA-CRT Signatures. CHES 2011: 192-206 - Ray C. C. Cheung, Sylvain Duquesne, Junfeng Fan, Nicolas Guillermin, Ingrid Verbauwhede, Gavin Xiaoxu Yao:
FPGA Implementation of Pairings Using Residue Number System and Lazy Reduction. CHES 2011: 421-441 - Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil:
Improved Collision-Correlation Power Analysis on First Order Protected AES. CHES 2011: 49-62 - Patrick Derbez, Pierre-Alain Fouque, Delphine Leresteux:
Meet-in-the-Middle and Impossible Differential Fault Analysis on AES. CHES 2011: 274-291 - Junfeng Fan, Benedikt Gierlichs, Frederik Vercauteren:
To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order. CHES 2011: 143-159 - Laurie Genelle, Emmanuel Prouff, Michaël Quisquater:
Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings. CHES 2011: 240-255 - Santosh Ghosh, Dipanwita Roy Chowdhury, Abhijit Das:
High Speed Cryptoprocessor for η T Pairing on 128-bit Secure Supersingular Elliptic Curves over Characteristic Two Fields. CHES 2011: 442-458 - Louis Goubin, Ange Martinelli:
Protecting AES with Shamir's Secret Sharing Scheme. CHES 2011: 79-94 - Philipp Grabher, Johann Großschädl, Simon Hoerder, Kimmo Järvinen, Dan Page, Stefan Tillich, Marcin Wójcik:
An Exploration of Mechanisms for Dynamic Cryptographic Instruction Set Extension. CHES 2011: 1-16 - Tim Güneysu, Amir Moradi:
Generic Side-Channel Countermeasures for Reconfigurable Devices. CHES 2011: 33-48 - Jian Guo, Thomas Peyrin, Axel Poschmann, Matthew J. B. Robshaw:
The LED Block Cipher. CHES 2011: 326-341 - Ekawat Homsirikamol, Marcin Rogawski, Kris Gaj:
Throughput vs. Area Trade-offs in High-Speed Architectures of Five Round 3 SHA-3 Candidates Implemented Using Xilinx and Altera FPGAs. CHES 2011: 491-506 - Michael Hutter, Erich Wenger:
Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors. CHES 2011: 459-474 - Stefan Katzenbeisser, Ünal Koçabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert Jan Schrijen, Heike Schröder, Christian Wachsmann:
Recyclable PUFs: Logically Reconfigurable PUFs. CHES 2011: 374-389 - HeeSeok Kim, Seokhie Hong, Jongin Lim:
A Fast and Provably Secure Higher-Order Masking of AES S-Box. CHES 2011: 95-107 - Aswin Raghav Krishna, Seetharam Narasimhan, Xinmu Wang, Swarup Bhunia:
MECCA: A Robust Low-Overhead PUF Using Embedded Memory Array. CHES 2011: 407-420 - Po-Chun Kuo, Michael Schneider, Özgür Dagdelen, Jan Reichelt, Johannes Buchmann, Chen-Mou Cheng, Bo-Yin Yang:
Extreme Enumeration on GPU and in Clouds - - How Many Dollars You Need to Break SVP Challenges -. CHES 2011: 176-191 - Mehrdad Majzoobi, Farinaz Koushanfar, Srinivas Devadas:
FPGA-Based True Random Number Generation Using Circuit Metastability with Adaptive Feedback Control. CHES 2011: 17-32 - Marcel Medwed, François-Xavier Standaert:
Extractors against Side-Channel Attacks: Weak or Strong? CHES 2011: 256-272 - Amir Moradi, Oliver Mischke, Christof Paar, Yang Li, Kazuo Ohta, Kazuo Sakiyama:
On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting. CHES 2011: 292-311 - David F. Oswald, Christof Paar:
Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World. CHES 2011: 207-222 - Albrecht Petzoldt, Enrico Thomae, Stanislav Bulygin, Christopher Wolf:
Small Public Keys and Fast Verification for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic Public Key Systems. CHES 2011: 475-490 - Emmanuel Prouff, Thomas Roche:
Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols. CHES 2011: 63-78 - Mathieu Renauld, Dina Kamel, François-Xavier Standaert, Denis Flandre:
Information Theoretic and Security Analysis of a 65-Nanometer DDSLL AES S-Box. CHES 2011: 223-239 - Michael Schneider, Norman Göttert:
Random Sampling for Short Lattice Vectors on Graphics Cards. CHES 2011: 160-175 - Kyoji Shibutani, Takanori Isobe, Harunaga Hiwatari, Atsushi Mitsuda, Toru Akishita, Taizo Shirai:
Piccolo: An Ultra-Lightweight Blockcipher. CHES 2011: 342-357 - Jonathan Taverne, Armando Faz-Hernández, Diego F. Aranha, Francisco Rodríguez-Henríquez, Darrel Hankerson, Julio César López-Hernández:
Software Implementation of Binary Elliptic Curves: Impact of the Carry-Less Multiplier on Scalar Multiplication. CHES 2011: 108-123
skipping 4 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-28 18:54 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint