Search dblp for Publications

export results for "stream:conf/proofs:"

 download as .bib file

@inproceedings{DBLP:conf/proofs/CarreDFGP19,
  author       = {S{\'{e}}bastien Carr{\'{e}} and
                  Victor Dyseryn and
                  Adrien Facon and
                  Sylvain Guilley and
                  Thomas Perianin},
  editor       = {Karine Heydemann and
                  Ulrich K{\"{u}}hne and
                  Letitia Li},
  title        = {End-to-end automated cache-timing attack driven by Machine Learning},
  booktitle    = {Proceedings of 8th International Workshop on Security Proofs for Embedded
                  Systems, {PROOFS} 2019, colocated with {CHES} 2018, Atlanta, GA, USA,
                  August 24, 2019},
  series       = {Kalpa Publications in Computing},
  volume       = {11},
  pages        = {1--16},
  publisher    = {EasyChair},
  year         = {2019},
  url          = {https://doi.org/10.29007/nwj8},
  doi          = {10.29007/NWJ8},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/proofs/CarreDFGP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/proofs/ChengCGDG19,
  author       = {Wei Cheng and
                  Claude Carlet and
                  Kouassi Goli and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  editor       = {Karine Heydemann and
                  Ulrich K{\"{u}}hne and
                  Letitia Li},
  title        = {Detecting Faults in Inner-Product Masking Scheme - {IPM-FD:} {IPM}
                  with Fault Detection},
  booktitle    = {Proceedings of 8th International Workshop on Security Proofs for Embedded
                  Systems, {PROOFS} 2019, colocated with {CHES} 2018, Atlanta, GA, USA,
                  August 24, 2019},
  series       = {Kalpa Publications in Computing},
  volume       = {11},
  pages        = {17--32},
  publisher    = {EasyChair},
  year         = {2019},
  url          = {https://doi.org/10.29007/fv2n},
  doi          = {10.29007/FV2N},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/proofs/ChengCGDG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/proofs/GanjiTSSFT19,
  author       = {Fatemeh Ganji and
                  Shahin Tajik and
                  Pascal Stauss and
                  Jean{-}Pierre Seifert and
                  Domenic Forte and
                  Mark M. Tehranipoor},
  editor       = {Karine Heydemann and
                  Ulrich K{\"{u}}hne and
                  Letitia Li},
  title        = {Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones},
  booktitle    = {Proceedings of 8th International Workshop on Security Proofs for Embedded
                  Systems, {PROOFS} 2019, colocated with {CHES} 2018, Atlanta, GA, USA,
                  August 24, 2019},
  series       = {Kalpa Publications in Computing},
  volume       = {11},
  pages        = {33--48},
  publisher    = {EasyChair},
  year         = {2019},
  url          = {https://doi.org/10.29007/nbm3},
  doi          = {10.29007/NBM3},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/proofs/GanjiTSSFT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/proofs/KerenP19,
  author       = {Osnat Keren and
                  Ilia Polian},
  editor       = {Karine Heydemann and
                  Ulrich K{\"{u}}hne and
                  Letitia Li},
  title        = {A comment on information leakage from robust code-based checkers detecting
                  fault attacks on cryptographic primitives},
  booktitle    = {Proceedings of 8th International Workshop on Security Proofs for Embedded
                  Systems, {PROOFS} 2019, colocated with {CHES} 2018, Atlanta, GA, USA,
                  August 24, 2019},
  series       = {Kalpa Publications in Computing},
  volume       = {11},
  pages        = {49--63},
  publisher    = {EasyChair},
  year         = {2019},
  url          = {https://doi.org/10.29007/r2sc},
  doi          = {10.29007/R2SC},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/proofs/KerenP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/proofs/UenoTHH19,
  author       = {Rei Ueno and
                  Junko Takahashi and
                  Yu{-}ichi Hayashi and
                  Naofumi Homma},
  editor       = {Karine Heydemann and
                  Ulrich K{\"{u}}hne and
                  Letitia Li},
  title        = {Constructing Sliding Windows Leak from Noisy Cache Timing Information
                  of {OSS-RSA}},
  booktitle    = {Proceedings of 8th International Workshop on Security Proofs for Embedded
                  Systems, {PROOFS} 2019, colocated with {CHES} 2018, Atlanta, GA, USA,
                  August 24, 2019},
  series       = {Kalpa Publications in Computing},
  volume       = {11},
  pages        = {64--77},
  publisher    = {EasyChair},
  year         = {2019},
  url          = {https://doi.org/10.29007/ws8z},
  doi          = {10.29007/WS8Z},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/proofs/UenoTHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/proofs/2019,
  editor       = {Karine Heydemann and
                  Ulrich K{\"{u}}hne and
                  Letitia Li},
  title        = {Proceedings of 8th International Workshop on Security Proofs for Embedded
                  Systems, {PROOFS} 2019, colocated with {CHES} 2018, Atlanta, GA, USA,
                  August 24, 2019},
  series       = {Kalpa Publications in Computing},
  volume       = {11},
  publisher    = {EasyChair},
  year         = {2019},
  url          = {https://easychair.org/publications/volume/PROOFS\_2019},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/proofs/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/AlamMKLS18,
  author       = {Manaar Alam and
                  Debdeep Mukhopadhyay and
                  Sai Praveen Kadiyala and
                  Siew Kei Lam and
                  Thambipillai Srikanthan},
  editor       = {Lejla Batina and
                  Ulrich K{\"{u}}hne and
                  Nele Mentens},
  title        = {Side-Channel Assisted Malware Classifier with Gradient Descent Correction
                  for Embedded Platforms},
  booktitle    = {{PROOFS} 2018, 7th International Workshop on Security Proofs for Embedded
                  Systems, colocated with {CHES} 2018, Amsterdam, The Netherlands, September
                  13, 2018},
  series       = {Kalpa Publications in Computing},
  volume       = {7},
  pages        = {1--15},
  publisher    = {EasyChair},
  year         = {2018},
  url          = {https://doi.org/10.29007/5sdj},
  doi          = {10.29007/5SDJ},
  timestamp    = {Tue, 30 Nov 2021 10:25:43 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/AlamMKLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ItoUHA18,
  author       = {Akira Ito and
                  Rei Ueno and
                  Naofumi Homma and
                  Takafumi Aoki},
  editor       = {Lejla Batina and
                  Ulrich K{\"{u}}hne and
                  Nele Mentens},
  title        = {A Non-Reversible Insertion Method for Hardware Trojans Based on Path
                  Delay Faults},
  booktitle    = {{PROOFS} 2018, 7th International Workshop on Security Proofs for Embedded
                  Systems, colocated with {CHES} 2018, Amsterdam, The Netherlands, September
                  13, 2018},
  series       = {Kalpa Publications in Computing},
  volume       = {7},
  pages        = {50--67},
  publisher    = {EasyChair},
  year         = {2018},
  url          = {https://doi.org/10.29007/fxvv},
  doi          = {10.29007/FXVV},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/ItoUHA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KarpGKP18,
  author       = {Batya Karp and
                  Ma{\"{e}}l Gay and
                  Osnat Keren and
                  Ilia Polian},
  editor       = {Lejla Batina and
                  Ulrich K{\"{u}}hne and
                  Nele Mentens},
  title        = {Detection and Correction of Malicious and Natural Faults in Cryptographic
                  Modules},
  booktitle    = {{PROOFS} 2018, 7th International Workshop on Security Proofs for Embedded
                  Systems, colocated with {CHES} 2018, Amsterdam, The Netherlands, September
                  13, 2018},
  series       = {Kalpa Publications in Computing},
  volume       = {7},
  pages        = {68--82},
  publisher    = {EasyChair},
  year         = {2018},
  url          = {https://doi.org/10.29007/w37p},
  doi          = {10.29007/W37P},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/KarpGKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SiddiqiSHPS18,
  author       = {Muhammad Ali Siddiqi and
                  Robert M. Seepers and
                  Mohammad Hamad and
                  Vassilis Prevelakis and
                  Christos Strydis},
  editor       = {Lejla Batina and
                  Ulrich K{\"{u}}hne and
                  Nele Mentens},
  title        = {Attack-tree-based Threat Modeling of Medical Implants},
  booktitle    = {{PROOFS} 2018, 7th International Workshop on Security Proofs for Embedded
                  Systems, colocated with {CHES} 2018, Amsterdam, The Netherlands, September
                  13, 2018},
  series       = {Kalpa Publications in Computing},
  volume       = {7},
  pages        = {32--49},
  publisher    = {EasyChair},
  year         = {2018},
  url          = {https://doi.org/10.29007/8gxh},
  doi          = {10.29007/8GXH},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/SiddiqiSHPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SijacicB0GV18,
  author       = {Danilo Sijacic and
                  Josep Balasch and
                  Bohan Yang and
                  Santosh Ghosh and
                  Ingrid Verbauwhede},
  editor       = {Lejla Batina and
                  Ulrich K{\"{u}}hne and
                  Nele Mentens},
  title        = {Towards Efficient and Automated Side Channel Evaluations at Design
                  Time},
  booktitle    = {{PROOFS} 2018, 7th International Workshop on Security Proofs for Embedded
                  Systems, colocated with {CHES} 2018, Amsterdam, The Netherlands, September
                  13, 2018},
  series       = {Kalpa Publications in Computing},
  volume       = {7},
  pages        = {16--31},
  publisher    = {EasyChair},
  year         = {2018},
  url          = {https://doi.org/10.29007/mbf3},
  doi          = {10.29007/MBF3},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/SijacicB0GV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2018proofs,
  editor       = {Lejla Batina and
                  Ulrich K{\"{u}}hne and
                  Nele Mentens},
  title        = {{PROOFS} 2018, 7th International Workshop on Security Proofs for Embedded
                  Systems, colocated with {CHES} 2018, Amsterdam, The Netherlands, September
                  13, 2018},
  series       = {Kalpa Publications in Computing},
  volume       = {7},
  publisher    = {EasyChair},
  year         = {2018},
  url          = {http://www.easychair.org/publications/volume/PROOFS\_2018},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/2018proofs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/0003RM17,
  author       = {Poulami Das and
                  Debapriya Basu Roy and
                  Debdeep Mukhopadhyay},
  editor       = {Ulrich K{\"{u}}hne and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  title        = {Automatic Generation of {HCCA} Resistant Scalar Multiplication Algorithm
                  by Proper Sequencing of Field Multiplier Operands},
  booktitle    = {{PROOFS} 2017, 6th International Workshop on Security Proofs for Embedded
                  Systems, Taipei, Taiwan, September 29th, 2017},
  series       = {EPiC Series in Computing},
  volume       = {49},
  pages        = {33--49},
  publisher    = {EasyChair},
  year         = {2017},
  url          = {https://doi.org/10.29007/qszz},
  doi          = {10.29007/QSZZ},
  timestamp    = {Tue, 30 Nov 2021 10:30:08 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/0003RM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BaumannSD17,
  author       = {Christoph Baumann and
                  Oliver Schwarz and
                  Mads Dam},
  editor       = {Ulrich K{\"{u}}hne and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  title        = {Compositional Verification of Security Properties for Embedded Execution
                  Platforms},
  booktitle    = {{PROOFS} 2017, 6th International Workshop on Security Proofs for Embedded
                  Systems, Taipei, Taiwan, September 29th, 2017},
  series       = {EPiC Series in Computing},
  volume       = {49},
  pages        = {1--16},
  publisher    = {EasyChair},
  year         = {2017},
  url          = {https://doi.org/10.29007/h4rv},
  doi          = {10.29007/H4RV},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BaumannSD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OuahmaMHE17,
  author       = {In{\`{e}}s Ben El Ouahma and
                  Quentin L. Meunier and
                  Karine Heydemann and
                  Emmanuelle Encrenaz},
  editor       = {Ulrich K{\"{u}}hne and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  title        = {Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly
                  Codes},
  booktitle    = {{PROOFS} 2017, 6th International Workshop on Security Proofs for Embedded
                  Systems, Taipei, Taiwan, September 29th, 2017},
  series       = {EPiC Series in Computing},
  volume       = {49},
  pages        = {17--32},
  publisher    = {EasyChair},
  year         = {2017},
  url          = {https://doi.org/10.29007/hhnf},
  doi          = {10.29007/HHNF},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/OuahmaMHE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SahaKMD17,
  author       = {Sayandeep Saha and
                  Ujjawal Kumar and
                  Debdeep Mukhopadhyay and
                  Pallab Dasgupta},
  editor       = {Ulrich K{\"{u}}hne and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  title        = {An Automated Framework for Exploitable Fault Identification in Block
                  Ciphers - {A} Data Mining Approach},
  booktitle    = {{PROOFS} 2017, 6th International Workshop on Security Proofs for Embedded
                  Systems, Taipei, Taiwan, September 29th, 2017},
  series       = {EPiC Series in Computing},
  volume       = {49},
  pages        = {50--67},
  publisher    = {EasyChair},
  year         = {2017},
  url          = {https://doi.org/10.29007/fmzl},
  doi          = {10.29007/FMZL},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/SahaKMD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/WisiolGMOSZ17,
  author       = {Nils Wisiol and
                  Christoph Graebnitz and
                  Marian Margraf and
                  Manuel Oswald and
                  Tudor A. A. Soroceanu and
                  Benjamin Zengin},
  editor       = {Ulrich K{\"{u}}hne and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  title        = {Why Attackers Lose: Design and Security Analysis of Arbitrarily Large
                  {XOR} Arbiter PUFs},
  booktitle    = {{PROOFS} 2017, 6th International Workshop on Security Proofs for Embedded
                  Systems, Taipei, Taiwan, September 29th, 2017},
  series       = {EPiC Series in Computing},
  volume       = {49},
  pages        = {68--83},
  publisher    = {EasyChair},
  year         = {2017},
  url          = {https://doi.org/10.29007/7nl2},
  doi          = {10.29007/7NL2},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/WisiolGMOSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2017proofs,
  editor       = {Ulrich K{\"{u}}hne and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  title        = {{PROOFS} 2017, 6th International Workshop on Security Proofs for Embedded
                  Systems, Taipei, Taiwan, September 29th, 2017},
  series       = {EPiC Series in Computing},
  volume       = {49},
  publisher    = {EasyChair},
  year         = {2017},
  url          = {https://easychair.org/publications/volume/PROOFS\_2017},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/2017proofs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}