Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Conference
    Name: Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015 2015
    URL: http://dl.acm.org/citation.cfm?id=2694805
    DBLP: db/conf/hipeac/cs2015.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 9 of 9  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Alexander Herrmann, Marc Stöttinger.
    Evaluation Tools for Multivariate Side-Channel Analysis.
    Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015 2015 (0) 2015
    Conference paper
    Harris E. Michail, Lenos Ioannou, Artemios G. Voyiatzis.
    Pipelined SHA-3 Implementations on FPGA: Architecture and Performance Analysis.
    Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015 2015 (0) 2015
    Conference paper
    Mathieu Carbone, Yannick Teglia, Philippe Maurine, Gilles R. Ducharme.
    Interest of MIA in frequency domain?
    Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015 2015 (0) 2015
    Conference paper
    Rainer Plaga, Dominik Merli.
    A new Definition and Classification of Physical Unclonable Functions.
    Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015 2015 (0) 2015
    Conference paper
    Loïc Zussa, Ingrid Exurville, Jean-Max Dutertre, Jean-Baptiste Rigaud, Bruno Robisson, Assia Tria, Jessy Clédière.
    Evidence of an information leakage between logically independent blocks.
    Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015 2015 (0) 2015
    Conference paper
    Mohsen Toorani.
    On Continuous After-the-Fact Leakage-Resilient Key Exchange.
    Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015 2015 (0) 2015
    Conference paper
    Paulo Martins, Leonel Sousa.
    Stretching the limits of Programmable Embedded Devices for Public-key Cryptography.
    Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015 2015 (0) 2015
    Conference paper
    Apostolos P. Fournaris, Nicolaos Klaoudatos, Nicolas Sklavos, Christos Koulamas.
    Fault and Power Analysis Attack Resistant RNS based Edwards Curve Point Multiplication.
    Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015 2015 (0) 2015
    Conference paper
    Wei He, Alexander Herrmann.
    Placement Security Analysis for Side-Channel Resistant Dual-Rail Scheme in FPGA.
    Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015 2015 (0) 2015
    Show item 1 to 9 of 9  

    Your query returned 9 matches in the database.