![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 31 matches
- 2017
- Roberto Avanzi, Howard M. Heys:
Selected Areas in Cryptography - SAC 2016 - 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10532, Springer 2017, ISBN 978-3-319-69452-8 [contents] - 2016
- Tobias Schneider, Amir Moradi
, François-Xavier Standaert
, Tim Güneysu
:
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms. SAC 2016: 58-78 - Matthew Amy, Olivia Di Matteo
, Vlad Gheorghiu, Michele Mosca, Alex Parent, John M. Schanck:
Estimating the Cost of Generic Quantum Pre-image Attacks on SHA-2 and SHA-3. SAC 2016: 317-337 - Jean-Claude Bajard
, Julien Eynard, M. Anwar Hasan, Vincent Zucca:
A Full RNS Variant of FV Like Somewhat Homomorphic Encryption Schemes. SAC 2016: 423-442 - Muhammad Barham, Orr Dunkelman, Stefan Lucks, Marc Stevens
:
New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity. SAC 2016: 247-263 - Amira Barki, Solenn Brunet, Nicolas Desmoulins, Jacques Traoré:
Improved Algebraic MACs and Practical Keyed-Verification Anonymous Credentials. SAC 2016: 360-380 - Tim Beyne
, Begül Bilgin:
Uniform First-Order Threshold Implementations. SAC 2016: 79-98 - Hao Chen, Kristin E. Lauter, Katherine E. Stange
:
Security Considerations for Galois Non-dual RLWE Families. SAC 2016: 443-462 - Jung Hee Cheon, Hyunsook Hong, Joohee Lee, Jooyoung Lee:
An Efficient Affine Equivalence Algorithm for Multiple S-Boxes and a Structured Affine Layer. SAC 2016: 299-316 - Ping Ngai Chung, Craig Costello
, Benjamin Smith
:
Fast, Uniform Scalar Multiplication for Genus 2 Jacobians with Fast Kummers. SAC 2016: 465-481 - Anamaria Costache, Nigel P. Smart, Srinivas Vivek
, Adrian Waller:
Fixed-Point Arithmetic in SHE Schemes. SAC 2016: 401-422 - Christoph Dobraunig
, Maria Eichlseder
, Florian Mendel
:
Cryptanalysis of Simpira v1. SAC 2016: 284-298 - Thomas Espitau, Pierre-Alain Fouque
, Benoît Gérard, Mehdi Tibouchi:
Loop-Abort Faults on Lattice-Based Fiat-Shamir and Hash-and-Sign Signatures. SAC 2016: 140-158 - Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud
:
Lattice Attacks Against Elliptic-Curve Signatures with Blinded Scalar Multiplication. SAC 2016: 120-139 - Aurore Guillevic
, François Morain, Emmanuel Thomé
:
Solving Discrete Logarithms on a 170-Bit MNT Curve by Pairing Reduction. SAC 2016: 559-578 - Shoichi Hirose, Yusuke Naito, Takeshi Sugawara:
Output Masking of Tweakable Even-Mansour Can Be Eliminated for Message Authentication Code. SAC 2016: 341-359 - Daniel Hutchinson:
A Robust and Sponge-Like PRNG with Improved Efficiency. SAC 2016: 381-398 - Thijs Laarhoven
:
Sieving for Closest Lattice Vectors (with Preprocessing). SAC 2016: 523-542 - Zeyi Liu, Neng Gao, Chenyang Tu, Yuan Ma, Zongbin Liu:
Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks. SAC 2016: 41-57 - Patrick Longa:
FourQNEON: Faster Elliptic Curve Scalar Multiplications on ARM Processors. SAC 2016: 501-519 - Dustin Moody, Ray A. Perlner, Daniel Smith-Tone:
Key Recovery Attack on the Cubic ABC Simple Matrix Multivariate Encryption Scheme. SAC 2016: 543-558 - Erick Nascimento, Lukasz Chmielewski, David F. Oswald
, Peter Schwabe:
Attacking Embedded ECC Implementations Through cmov Side Channels. SAC 2016: 99-119 - Conor Patrick, Bilgiday Yuce, Nahid Farhady Ghalaty, Patrick Schaumont
:
Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy. SAC 2016: 231-244 - Stjepan Picek, Bohan Yang, Vladimir Rozic, Nele Mentens
:
On the Construction of Hardware-Friendly 4\times 4 and 5\times 5 S-Boxes. SAC 2016: 161-179 - Francesco Regazzoni
:
Physical Attacks and Beyond. SAC 2016: 3-13 - Yu Sasaki, Yosuke Todo
:
New Differential Bounds and Division Property of Lilliput: Block Cipher with Extended Generalized Feistel Network. SAC 2016: 264-283 - Peter Schwabe, Ko Stoffelen:
All the AES You Need on Cortex-M3 and M4. SAC 2016: 180-194 - Danilo Sijacic, Andreas B. Kidmose
, Bohan Yang, Subhadeep Banik
, Begül Bilgin, Andrey Bogdanov, Ingrid Verbauwhede
:
Hold Your Breath, PRIMATEs Are Lightweight. SAC 2016: 197-216 - Douglas Stebila
, Michele Mosca:
Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project. SAC 2016: 14-37 - Mostafa M. I. Taha, Arash Reyhani-Masoleh, Patrick Schaumont
:
Keymill: Side-Channel Resilient Key Generator, A New Concept for SCA-Security by Design - A New Concept for SCA-Security by Design. SAC 2016: 217-230
skipping 1 more match
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-01 13:58 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint