|
|
PROOFS 2017: Author Index| Author | Papers |
|---|
| B | | Basu Roy, Debapriya | Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands | | Baumann, Christoph | Compositional Verification of Security Properties for Embedded Execution Platforms | | Ben El Ouahma, Inès | Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes | | D | | Dam, Mads | Compositional Verification of Security Properties for Embedded Execution Platforms | | Das, Poulami | Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands | | Dasgupta, Pallab | An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach | | E | | Encrenaz, Emmanuelle | Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes | | G | | Graebnitz, Christoph | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs | | H | | Heydemann, Karine | Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes | | K | | Kumar, Ujjawal | An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach | | M | | Margraf, Marian | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs | | Meunier, Quentin | Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes | | Mukhopadhyay, Debdeep | Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands | | Mukhopadhyay, Debdeep | An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach | | O | | Oswald, Manuel | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs | | S | | Saha, Sayandeep | An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach | | Schwarz, Oliver | Compositional Verification of Security Properties for Embedded Execution Platforms | | Soroceanu, Tudor | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs | | W | | Wisiol, Nils | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs | | Z | | Zengin, Benjamin | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs |
|
|
|