


default search action
17th CARDIS 2018: Montpellier, France
- Begül Bilgin
, Jean-Bernard Fischer:
Smart Card Research and Advanced Applications, 17th International Conference, CARDIS 2018, Montpellier, France, November 12-14, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11389, Springer 2019, ISBN 978-3-030-15461-5 - Guang Yang
, Huizhong Li
, Jingdian Ming, Yongbin Zhou:
Convolutional Neural Network Based Side-Channel Attacks in Time-Frequency Representations. 1-17 - Joey Green, Arnab Roy
, Elisabeth Oswald:
A Systematic Study of the Impact of Graphical Models on Inference-Based Attacks on AES. 18-34 - Stjepan Picek, Annelie Heuser, Alan Jovic, Karlo Knezevic
, Tania Richmond:
Improving Side-Channel Analysis Through Semi-supervised Learning. 35-50 - Si Gao
, Elisabeth Oswald, Hua Chen, Wei Xi:
Non-profiled Mask Recovery: The Impact of Independent Component Analysis. 51-64 - François-Xavier Standaert
:
How (Not) to Use Welch's T-Test in Side-Channel Security Evaluations. 65-79 - Vincent Grosso:
Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys. 80-94 - Markku-Juhani O. Saarinen
, Sauvik Bhattacharya, Óscar García-Morchón, Ronald Rietman, Ludo Tolhuizen, Zhenfei Zhang:
Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M. 95-110 - Felix Wegener, Amir Moradi
:
Yet Another Size Record for AES: A First-Order SCA Secure AES S-Box Based on \(\mathrm {GF}(2^8)\) Multiplication. 111-124 - Shaofeng Zhu
, Hua Chen, Limin Fan, Meihui Chen, Wei Xi, Dengguo Feng:
Jitter Estimation with High Accuracy for Oscillator-Based TRNGs. 125-139 - Marc Lacruche, Philippe Maurine:
Electromagnetic Activity vs. Logical Activity: Near Field Scans for Reverse Engineering. 140-155 - Dilip S. V. Kumar, Arthur Beckers
, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede
:
An In-Depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P. 156-170 - Sebastian Vasile, David F. Oswald
, Tom Chothia:
Breaking All the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices. 171-185 - Sergei Volokitin:
Exploiting JCVM on Smart Cards Using Forged References in the API Calls. 186-199

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.