Linked e-resources
Details
Table of Contents
Deployment of EMC-Compliant IC Chip Techniques in Design for Hardware Security
Real Processing-in-Memory with Memristive Memory Processing Unit
Length Preserving Symmetric Encryption: Is it Important?
Towards Automatic Application of Side Channel Countermeasures
Challenges in Deep Learning-based Profiled Side-channel Analysis
A Study of Persistent Fault Analysis
Internal state recovery attack on Stream Ciphers : Breaking BIVIUM
Related-key Differential Cryptanalysis of Full Round CRAFT
SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security
One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA
An Efficient Practical Implementation of Impossible-Differentia Cryptanalysis for Five-Round AES-128
Automated Classification of Web-Application Attacks for Intrusion Detection
Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean Functions
ProTro: A Probabilistic Counter based Hardware Trojan Attack on FPGA based MACSec enabled Ethernet Switch
Encrypted Classification Using Secure K-Nearest Neighbour Computation
A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices
Revisiting the Security of LPN based RFID Authentication Protocol and Potential Exploits in Hardware Implementations.
Real Processing-in-Memory with Memristive Memory Processing Unit
Length Preserving Symmetric Encryption: Is it Important?
Towards Automatic Application of Side Channel Countermeasures
Challenges in Deep Learning-based Profiled Side-channel Analysis
A Study of Persistent Fault Analysis
Internal state recovery attack on Stream Ciphers : Breaking BIVIUM
Related-key Differential Cryptanalysis of Full Round CRAFT
SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security
One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA
An Efficient Practical Implementation of Impossible-Differentia Cryptanalysis for Five-Round AES-128
Automated Classification of Web-Application Attacks for Intrusion Detection
Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean Functions
ProTro: A Probabilistic Counter based Hardware Trojan Attack on FPGA based MACSec enabled Ethernet Switch
Encrypted Classification Using Secure K-Nearest Neighbour Computation
A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices
Revisiting the Security of LPN based RFID Authentication Protocol and Potential Exploits in Hardware Implementations.