Linked e-resources
Details
Table of Contents
Kernel Discriminant Analysis for Information Extraction in the Presence of Masking
Second Order Side-Channel Analysis on ISO9797-1 MAC Algorithm 3
Side-Channel Analysis of the TUAK Algorithm Used for Authentication and Key Agreement in 3G/4G Networks
Reverse Engineering Flash EEPROM Memories Using Scanning Electron Microscopy
Spectre: A Tiny Side-Channel Resistant Speck Core for FPGAs
Concealing Secrets in Embedded Processors Designs
The Hell Forgery, Self-Modifying Codes Shoot again
Logical Attacks on Secured Containers of the Java Card Platform
Single-Trace Side-Channel Attacks on Scalar Multiplications with Pre-Computations
A Compact and Exception-Free Ladder for All Short Weierstrass Elliptic Curves
Inner Product Masking for Bit-slice Ciphers and Security Order Amplification for Linear Leakages
Squeezing Polynomial Masking in Tower Fields
PRNGs for Masking Applications and Their Mapping to Evolvable Hardware
Automated Detection of Instruction Cache Leaks in Modular Exponentiation Software
An Analysis of the Learning Parity with Noise Assumption against Fault Attacks.
Second Order Side-Channel Analysis on ISO9797-1 MAC Algorithm 3
Side-Channel Analysis of the TUAK Algorithm Used for Authentication and Key Agreement in 3G/4G Networks
Reverse Engineering Flash EEPROM Memories Using Scanning Electron Microscopy
Spectre: A Tiny Side-Channel Resistant Speck Core for FPGAs
Concealing Secrets in Embedded Processors Designs
The Hell Forgery, Self-Modifying Codes Shoot again
Logical Attacks on Secured Containers of the Java Card Platform
Single-Trace Side-Channel Attacks on Scalar Multiplications with Pre-Computations
A Compact and Exception-Free Ladder for All Short Weierstrass Elliptic Curves
Inner Product Masking for Bit-slice Ciphers and Security Order Amplification for Linear Leakages
Squeezing Polynomial Masking in Tower Fields
PRNGs for Masking Applications and Their Mapping to Evolvable Hardware
Automated Detection of Instruction Cache Leaks in Modular Exponentiation Software
An Analysis of the Learning Parity with Noise Assumption against Fault Attacks.