default search action
Search dblp for Publications
export results for "stream:conf/proofs:"
@inproceedings{DBLP:conf/proofs/CarreDFGP19, author = {S{\'{e}}bastien Carr{\'{e}} and Victor Dyseryn and Adrien Facon and Sylvain Guilley and Thomas Perianin}, editor = {Karine Heydemann and Ulrich K{\"{u}}hne and Letitia Li}, title = {End-to-end automated cache-timing attack driven by Machine Learning}, booktitle = {Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, {PROOFS} 2019, colocated with {CHES} 2018, Atlanta, GA, USA, August 24, 2019}, series = {Kalpa Publications in Computing}, volume = {11}, pages = {1--16}, publisher = {EasyChair}, year = {2019}, url = {https://doi.org/10.29007/nwj8}, doi = {10.29007/NWJ8}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/proofs/CarreDFGP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/proofs/ChengCGDG19, author = {Wei Cheng and Claude Carlet and Kouassi Goli and Jean{-}Luc Danger and Sylvain Guilley}, editor = {Karine Heydemann and Ulrich K{\"{u}}hne and Letitia Li}, title = {Detecting Faults in Inner-Product Masking Scheme - {IPM-FD:} {IPM} with Fault Detection}, booktitle = {Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, {PROOFS} 2019, colocated with {CHES} 2018, Atlanta, GA, USA, August 24, 2019}, series = {Kalpa Publications in Computing}, volume = {11}, pages = {17--32}, publisher = {EasyChair}, year = {2019}, url = {https://doi.org/10.29007/fv2n}, doi = {10.29007/FV2N}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/proofs/ChengCGDG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/proofs/GanjiTSSFT19, author = {Fatemeh Ganji and Shahin Tajik and Pascal Stauss and Jean{-}Pierre Seifert and Domenic Forte and Mark M. Tehranipoor}, editor = {Karine Heydemann and Ulrich K{\"{u}}hne and Letitia Li}, title = {Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones}, booktitle = {Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, {PROOFS} 2019, colocated with {CHES} 2018, Atlanta, GA, USA, August 24, 2019}, series = {Kalpa Publications in Computing}, volume = {11}, pages = {33--48}, publisher = {EasyChair}, year = {2019}, url = {https://doi.org/10.29007/nbm3}, doi = {10.29007/NBM3}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/proofs/GanjiTSSFT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/proofs/KerenP19, author = {Osnat Keren and Ilia Polian}, editor = {Karine Heydemann and Ulrich K{\"{u}}hne and Letitia Li}, title = {A comment on information leakage from robust code-based checkers detecting fault attacks on cryptographic primitives}, booktitle = {Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, {PROOFS} 2019, colocated with {CHES} 2018, Atlanta, GA, USA, August 24, 2019}, series = {Kalpa Publications in Computing}, volume = {11}, pages = {49--63}, publisher = {EasyChair}, year = {2019}, url = {https://doi.org/10.29007/r2sc}, doi = {10.29007/R2SC}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/proofs/KerenP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/proofs/UenoTHH19, author = {Rei Ueno and Junko Takahashi and Yu{-}ichi Hayashi and Naofumi Homma}, editor = {Karine Heydemann and Ulrich K{\"{u}}hne and Letitia Li}, title = {Constructing Sliding Windows Leak from Noisy Cache Timing Information of {OSS-RSA}}, booktitle = {Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, {PROOFS} 2019, colocated with {CHES} 2018, Atlanta, GA, USA, August 24, 2019}, series = {Kalpa Publications in Computing}, volume = {11}, pages = {64--77}, publisher = {EasyChair}, year = {2019}, url = {https://doi.org/10.29007/ws8z}, doi = {10.29007/WS8Z}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/proofs/UenoTHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/proofs/2019, editor = {Karine Heydemann and Ulrich K{\"{u}}hne and Letitia Li}, title = {Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, {PROOFS} 2019, colocated with {CHES} 2018, Atlanta, GA, USA, August 24, 2019}, series = {Kalpa Publications in Computing}, volume = {11}, publisher = {EasyChair}, year = {2019}, url = {https://easychair.org/publications/volume/PROOFS\_2019}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/proofs/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/AlamMKLS18, author = {Manaar Alam and Debdeep Mukhopadhyay and Sai Praveen Kadiyala and Siew Kei Lam and Thambipillai Srikanthan}, editor = {Lejla Batina and Ulrich K{\"{u}}hne and Nele Mentens}, title = {Side-Channel Assisted Malware Classifier with Gradient Descent Correction for Embedded Platforms}, booktitle = {{PROOFS} 2018, 7th International Workshop on Security Proofs for Embedded Systems, colocated with {CHES} 2018, Amsterdam, The Netherlands, September 13, 2018}, series = {Kalpa Publications in Computing}, volume = {7}, pages = {1--15}, publisher = {EasyChair}, year = {2018}, url = {https://doi.org/10.29007/5sdj}, doi = {10.29007/5SDJ}, timestamp = {Tue, 30 Nov 2021 10:25:43 +0100}, biburl = {https://dblp.org/rec/conf/ches/AlamMKLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ItoUHA18, author = {Akira Ito and Rei Ueno and Naofumi Homma and Takafumi Aoki}, editor = {Lejla Batina and Ulrich K{\"{u}}hne and Nele Mentens}, title = {A Non-Reversible Insertion Method for Hardware Trojans Based on Path Delay Faults}, booktitle = {{PROOFS} 2018, 7th International Workshop on Security Proofs for Embedded Systems, colocated with {CHES} 2018, Amsterdam, The Netherlands, September 13, 2018}, series = {Kalpa Publications in Computing}, volume = {7}, pages = {50--67}, publisher = {EasyChair}, year = {2018}, url = {https://doi.org/10.29007/fxvv}, doi = {10.29007/FXVV}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/ItoUHA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KarpGKP18, author = {Batya Karp and Ma{\"{e}}l Gay and Osnat Keren and Ilia Polian}, editor = {Lejla Batina and Ulrich K{\"{u}}hne and Nele Mentens}, title = {Detection and Correction of Malicious and Natural Faults in Cryptographic Modules}, booktitle = {{PROOFS} 2018, 7th International Workshop on Security Proofs for Embedded Systems, colocated with {CHES} 2018, Amsterdam, The Netherlands, September 13, 2018}, series = {Kalpa Publications in Computing}, volume = {7}, pages = {68--82}, publisher = {EasyChair}, year = {2018}, url = {https://doi.org/10.29007/w37p}, doi = {10.29007/W37P}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/KarpGKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SiddiqiSHPS18, author = {Muhammad Ali Siddiqi and Robert M. Seepers and Mohammad Hamad and Vassilis Prevelakis and Christos Strydis}, editor = {Lejla Batina and Ulrich K{\"{u}}hne and Nele Mentens}, title = {Attack-tree-based Threat Modeling of Medical Implants}, booktitle = {{PROOFS} 2018, 7th International Workshop on Security Proofs for Embedded Systems, colocated with {CHES} 2018, Amsterdam, The Netherlands, September 13, 2018}, series = {Kalpa Publications in Computing}, volume = {7}, pages = {32--49}, publisher = {EasyChair}, year = {2018}, url = {https://doi.org/10.29007/8gxh}, doi = {10.29007/8GXH}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/SiddiqiSHPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SijacicB0GV18, author = {Danilo Sijacic and Josep Balasch and Bohan Yang and Santosh Ghosh and Ingrid Verbauwhede}, editor = {Lejla Batina and Ulrich K{\"{u}}hne and Nele Mentens}, title = {Towards Efficient and Automated Side Channel Evaluations at Design Time}, booktitle = {{PROOFS} 2018, 7th International Workshop on Security Proofs for Embedded Systems, colocated with {CHES} 2018, Amsterdam, The Netherlands, September 13, 2018}, series = {Kalpa Publications in Computing}, volume = {7}, pages = {16--31}, publisher = {EasyChair}, year = {2018}, url = {https://doi.org/10.29007/mbf3}, doi = {10.29007/MBF3}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/SijacicB0GV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2018proofs, editor = {Lejla Batina and Ulrich K{\"{u}}hne and Nele Mentens}, title = {{PROOFS} 2018, 7th International Workshop on Security Proofs for Embedded Systems, colocated with {CHES} 2018, Amsterdam, The Netherlands, September 13, 2018}, series = {Kalpa Publications in Computing}, volume = {7}, publisher = {EasyChair}, year = {2018}, url = {http://www.easychair.org/publications/volume/PROOFS\_2018}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/2018proofs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/0003RM17, author = {Poulami Das and Debapriya Basu Roy and Debdeep Mukhopadhyay}, editor = {Ulrich K{\"{u}}hne and Jean{-}Luc Danger and Sylvain Guilley}, title = {Automatic Generation of {HCCA} Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands}, booktitle = {{PROOFS} 2017, 6th International Workshop on Security Proofs for Embedded Systems, Taipei, Taiwan, September 29th, 2017}, series = {EPiC Series in Computing}, volume = {49}, pages = {33--49}, publisher = {EasyChair}, year = {2017}, url = {https://doi.org/10.29007/qszz}, doi = {10.29007/QSZZ}, timestamp = {Tue, 30 Nov 2021 10:30:08 +0100}, biburl = {https://dblp.org/rec/conf/ches/0003RM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BaumannSD17, author = {Christoph Baumann and Oliver Schwarz and Mads Dam}, editor = {Ulrich K{\"{u}}hne and Jean{-}Luc Danger and Sylvain Guilley}, title = {Compositional Verification of Security Properties for Embedded Execution Platforms}, booktitle = {{PROOFS} 2017, 6th International Workshop on Security Proofs for Embedded Systems, Taipei, Taiwan, September 29th, 2017}, series = {EPiC Series in Computing}, volume = {49}, pages = {1--16}, publisher = {EasyChair}, year = {2017}, url = {https://doi.org/10.29007/h4rv}, doi = {10.29007/H4RV}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BaumannSD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OuahmaMHE17, author = {In{\`{e}}s Ben El Ouahma and Quentin L. Meunier and Karine Heydemann and Emmanuelle Encrenaz}, editor = {Ulrich K{\"{u}}hne and Jean{-}Luc Danger and Sylvain Guilley}, title = {Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes}, booktitle = {{PROOFS} 2017, 6th International Workshop on Security Proofs for Embedded Systems, Taipei, Taiwan, September 29th, 2017}, series = {EPiC Series in Computing}, volume = {49}, pages = {17--32}, publisher = {EasyChair}, year = {2017}, url = {https://doi.org/10.29007/hhnf}, doi = {10.29007/HHNF}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/OuahmaMHE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SahaKMD17, author = {Sayandeep Saha and Ujjawal Kumar and Debdeep Mukhopadhyay and Pallab Dasgupta}, editor = {Ulrich K{\"{u}}hne and Jean{-}Luc Danger and Sylvain Guilley}, title = {An Automated Framework for Exploitable Fault Identification in Block Ciphers - {A} Data Mining Approach}, booktitle = {{PROOFS} 2017, 6th International Workshop on Security Proofs for Embedded Systems, Taipei, Taiwan, September 29th, 2017}, series = {EPiC Series in Computing}, volume = {49}, pages = {50--67}, publisher = {EasyChair}, year = {2017}, url = {https://doi.org/10.29007/fmzl}, doi = {10.29007/FMZL}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/SahaKMD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/WisiolGMOSZ17, author = {Nils Wisiol and Christoph Graebnitz and Marian Margraf and Manuel Oswald and Tudor A. A. Soroceanu and Benjamin Zengin}, editor = {Ulrich K{\"{u}}hne and Jean{-}Luc Danger and Sylvain Guilley}, title = {Why Attackers Lose: Design and Security Analysis of Arbitrarily Large {XOR} Arbiter PUFs}, booktitle = {{PROOFS} 2017, 6th International Workshop on Security Proofs for Embedded Systems, Taipei, Taiwan, September 29th, 2017}, series = {EPiC Series in Computing}, volume = {49}, pages = {68--83}, publisher = {EasyChair}, year = {2017}, url = {https://doi.org/10.29007/7nl2}, doi = {10.29007/7NL2}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/WisiolGMOSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2017proofs, editor = {Ulrich K{\"{u}}hne and Jean{-}Luc Danger and Sylvain Guilley}, title = {{PROOFS} 2017, 6th International Workshop on Security Proofs for Embedded Systems, Taipei, Taiwan, September 29th, 2017}, series = {EPiC Series in Computing}, volume = {49}, publisher = {EasyChair}, year = {2017}, url = {https://easychair.org/publications/volume/PROOFS\_2017}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/2017proofs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.