default search action
31. Krypto-Tag 2019: Berlin, Germany
- Marcel Selhorst, Daniel Loebenberger, Michael Nüsken:
31. Krypto-Tag, Berlin, Germany, October 17-18, 2019. Gesellschaft für Informatik e.V. / FG KRYPTO 2019 - Marcel Selhorst:
Introduction to QPSI - Who we are and what we do Hardware. - Victor van der Veen:
When Memory Serves Not So Well - Memory Errors 30 Years Later. - Marcin Aftowicz, Dan Klann, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Evaluation of the ECDSA IHP Hardware Accelerator. - Nils Wisiol:
Towards Secure Strong PUFs. - Alejandro Sosa, Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
On the Impact of the Sampling Rate on the Success of Horizontal DEMA Attack. - Anders P. K. Dalskov, Marcel Keller, Claudio Orlandi, Kris Shrishak, Haya Schulmann:
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC. - Jean Paul Degabriele, Christian Janson, Patrick Struck:
Sponges Resist Leakage: The Case of Authenticated Encryption. - Roman Natarov, Yauhen Varabei, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Edge computing devices assessment for cryptography and biomedical signal analysis. - Yauhen Varabei, Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Intelligent Clustering as a Means to Improve K-means Based Horizontal Attacks. - Markus Brandt, Haya Schulmann, Michael Waidner:
Distributed Domain Validation (DDV). - Joo Cho, Stefan-Lukas Gazdag, Alexander von Gernler, Helmut Grießer, Sophia Grundner-Culemann, Tobias Guggemos, Tobias Heider, Daniel Loebenberger:
Towards Quantum-resistant Virtual Private Networks. - Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Jean-Pierre Seifert:
Anatomy of Commercial IMSI Catchers and Detectors. - Tim Ohlendorf, Wolfgang Studier, Marian Margraf:
SLIDEDroid: A Secure Lightweight Identity for the Android Platform. - Robert Buhren:
Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation. - Franziska Boenisch:
Applying Differential Privacy to Machine Learning: Challenges and Potentials. - Kai Lehniger, Yauhen Varabei, Marcin Aftowicz, Seyed Ehsan Hashemi Rastegar, Zoya Dyka, Peter Langendörfer:
Using machine learning techniques for hardware performance counter classification and ROP attack detection.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.