|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 14 occurrences of 13 keywords
|
|
|
Results
Found 17 publication records. Showing 17 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
60 | Mohd A. Bashar, Ganesh Krishnan, Markus G. Kuhn, Eugene H. Spafford, Samuel S. Wagstaff Jr. |
Low-threat security patches and tools. |
ICSM |
1997 |
DBLP DOI BibTeX RDF |
low-threat security patches, dangerous information, vulnerability information, software vendor, binary program patch, differential application times, cryptoprocessors, enciphered operating systems, synchronization, reverse engineering, customization, security of data, security tools |
57 | Sylvain Guilley, Florent Flament, Philippe Hoogvorst, Renaud Pacalet, Yves Mathieu |
Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors. |
IEEE Des. Test Comput. |
2007 |
DBLP DOI BibTeX RDF |
robust hardware, back-end design automation, power-constant architectures, DFY, side-channel attacks, DFM, mitigation |
33 | Shahriar Ebrahimi, Siavash Bayat Sarmadi, Hatameh Mosanaei-Boorani |
Post-Quantum Cryptoprocessors Optimized for Edge and Resource-Constrained Devices in IoT. |
IEEE Internet Things J. |
2019 |
DBLP DOI BibTeX RDF |
|
33 | Theodore Winograd, Rabia Shahid, Kris Gaj |
An Automated Scheduler-Based Approach for the Development of Cryptoprocessors for Pairing-Based Cryptosystems. |
IPDPS Workshops |
2019 |
DBLP DOI BibTeX RDF |
|
33 | Gabriel Gallin |
Unités arithmétiques et cryptoprocesseurs matériels pour la cryptographie sur courbe hyperelliptique. (Hardware arithmetic units and cryptoprocessors for hyperelliptic curve cryptography). |
|
2018 |
RDF |
|
33 | Claudia Patricia Renteria-Mejia, Jaime Velasco-Medina |
High-Throughput Ring-LWE Cryptoprocessors. |
IEEE Trans. Very Large Scale Integr. Syst. |
2017 |
DBLP DOI BibTeX RDF |
|
33 | Sujoy Sinha Roy |
Public Key Cryptography on Hardware Platforms: Design and Analysis of Elliptic Curve and Lattice-based Cryptoprocessors ; Public key cryptografie op hardware platforms: ontwerp en analyse van elliptische krommen en rooster-gebaseerde crypto-processors. |
|
2017 |
RDF |
|
33 | Sujoy Sinha Roy, Junfeng Fan, Ingrid Verbauwhede |
Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms. |
IEEE Trans. Very Large Scale Integr. Syst. |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Paulo Realpe-Muñoz, Vladimir Trujillo-Olaya, Jaime Velasco-Medina |
Design of elliptic curve cryptoprocessors over GF(2163) on Koblitz curves. |
LASCAS |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Sujoy Sinha Roy, Junfeng Fan, Ingrid Verbauwhede |
Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms. |
IACR Cryptol. ePrint Arch. |
2013 |
DBLP BibTeX RDF |
|
33 | Thomas Chabrier |
Arithmetic recodings for ECC cryptoprocessors with protections against side-channel attacks. (Unités arithmétiques reconfigurables pour cryptoprocesseurs robustes aux attaques). |
|
2013 |
RDF |
|
33 | Vladimir Trujillo-Olaya, Jaime Velasco-Medina |
Hardware Architectures for Elliptic Curve Cryptoprocessors Using Polynomial and Gaussian Normal Basis over GF(2233). |
Trans. Comput. Sci. |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Sylvain Guilley, Philippe Hoogvorst, Yves Mathieu, Renaud Pacalet |
The "Backend Duplication" Method. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
secured backend, differential signals, Information leakage |
24 | Luca Benini, Alberto Macii, Enrico Macii, Elvira Omerbegovic, Massimo Poncino, Fabrizio Pro |
A novel architecture for power maskable arithmetic units. |
ACM Great Lakes Symposium on VLSI |
2003 |
DBLP DOI BibTeX RDF |
security, cryptography, low-power design |
24 | Luca Benini, Alberto Macii, Enrico Macii, Elvira Omerbegovic, Fabrizio Pro, Massimo Poncino |
Energy-aware design techniques for differential power analysis protection. |
DAC |
2003 |
DBLP DOI BibTeX RDF |
low-power design, differential power analysis |
24 | Mike Bond, Ross J. Anderson |
API-Level Attacks on Embedded Systems. |
Computer |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Ross J. Anderson |
The Correctness of Crypto Transaction Sets. |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #17 of 17 (100 per page; Change: )
|
|