default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 105 matches
- 2024
- Fahim Ahmed, Md Tanvir Arafin:
SANTA: A Spatial Accelerator Design for Efficient Number Theoretic Transform (NTT) on Heterogeneous System-on-Chips. ASHES@CCS 2024: 2-10 - Tinghung Chiu, Jason LeGrow, Wenjie Xiong:
Practical Fault Injection Attacks on Constant Time CSIDH and Mitigation Techniques. ASHES@CCS 2024: 11-22 - Kohei Doi, Kunihiko Ooi, Takeshi Sugawara:
Acoustic Eavesdropping Attack Using Self-Mixing Laser Interferometer. ASHES@CCS 2024: 23-35 - Stefan Gehrer, Jorge Guajardo:
PHIDIAS: Power Signature Host-based Intrusion Detection in Automotive Microcontrollers. ASHES@CCS 2024: 36-47 - Archisman Ghosh, Swaroop Ghosh:
The Quantum Imitation Game: Reverse Engineering of Quantum Machine Learning Models. ASHES@CCS 2024: 48-57 - Dur-e-Shahwar Kundi, Jose M. Bermudo Mera, Pierre-Yves Strub, Michael Hutter:
High-Performance NTT Hardware Accelerator to Support ML-KEM and ML-DSA. ASHES@CCS 2024: 100-105 - Rodrigo Silva Lima, Raphael Viera, Jean-Max Dutertre, William Magrini, Matthieu Pommies, Anthony Bertrand:
When Data Shines - Leaking Data from Microcontrollers Through Photon Emission Analysis. ASHES@CCS 2024: 58-67 - Tahoura Mosavirik, Shahin Tajik:
BackMon: IC Backside Tamper Detection using On-Chip Impedance Monitoring. ASHES@CCS 2024: 68-77 - Kit Murdock, Martin Thompson, David F. Oswald:
FaultFinder: Lightning-fast, Multi-architectural Fault Injection Simulation. ASHES@CCS 2024: 78-88 - Endres Puschner, Maik Ender, Steffen Becker, Christof Paar:
Patching FPGAs: The Security Implications of Bitstream Modifications. ASHES@CCS 2024: 89-99 - Ingrid Verbauwhede:
Hardware Security: State of the Art. ASHES@CCS 2024: 1 - Chip-Hong Chang, Ulrich Rührmair, Jakub Szefer, Lejla Batina, Francesco Regazzoni:
Proceedings of the 2024 Workshop on Attacks and Solutions in Hardware Security, ASHES 2024, Salt Lake City, UT, USA, October 14-18, 2024. ACM 2024, ISBN 979-8-4007-1235-7 [contents] - 2023
- Eduardo Ferrufino, Luke Beckwith, Abubakr Abdulgadir, Jens-Peter Kaps:
FOBOS 3: An Open-Source Platform for Side-Channel Analysis and Benchmarking. ASHES@CCS 2023: 5-14 - Shungo Hayashi, Junichi Sakamoto, Masaki Chikano, Tsutomu Matsumoto:
Effective Layout Design for Laser Fault Sensor on FPGA. ASHES@CCS 2023: 103-112 - Yanning Ji, Elena Dubrova:
A Side-Channel Attack on a Masked Hardware Implementation of CRYSTALS-Kyber. ASHES@CCS 2023: 27-37 - Madhav Nair, Rajat Sadhukhan, Hammond Pearce, Debdeep Mukhopadhyay, Ramesh Karri:
Netlist Whisperer: AI and NLP Fight Circuit Leakage! ASHES@CCS 2023: 83-92 - Shoei Nashimoto, Tomoyuki Nagatsuka:
Cover Chirp Jaming: Hybrid Jamming-Deception Attack on FMCW Radar and Its Countermeasure. ASHES@CCS 2023: 39-50 - Hikaru Nishiyama, Daisuke Fujimoto, Yuichi Hayashi:
Remote Fault Injection Attack against Cryptographic Modules via Intentional Electromagnetic Interference from an Antenna. ASHES@CCS 2023: 93-102 - Ravikanth Pappu:
Physical Unclonable Functions: The First Fifty Years. ASHES@CCS 2023: 3 - Owen Pemberton, David F. Oswald:
BioLeak: Exploiting Cache Timing to Recover Fingerprint Minutiae Coordinates. ASHES@CCS 2023: 61-72 - Nils Rothaug, Simon Klix, Nicole Auth, Sinan Böcker, Endres Puschner, Steffen Becker, Christof Paar:
Towards Unsupervised SEM Image Segmentation for IC Layout Extraction. ASHES@CCS 2023: 123-128 - Xhani Marvin Saß, Thilo Krachenfels, Frederik Dermot Pustelnik, Jean-Pierre Seifert, Frank Altmann:
Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis. ASHES@CCS 2023: 113-122 - Alok K. Singh, Ryan M. Gerdes:
Better Side-Channel Attacks Through Measurements. ASHES@CCS 2023: 15-26 - Tobias Stelzer, Felix Oberhansl, Jonas Schupp, Patrick Karl:
Enabling Lattice-Based Post-Quantum Cryptography on the OpenTitan Platform. ASHES@CCS 2023: 51-60 - Claire Vishik:
In Search of Trust: 30 Years of Evolution of Trusted Computing and Hardware Security. ASHES@CCS 2023: 1 - Trevor Yap, Stjepan Picek, Shivam Bhasin:
Beyond the Last Layer: Deep Feature Loss Functions in Side-channel Analysis. ASHES@CCS 2023: 73-82 - Chip-Hong Chang, Ulrich Rührmair, Lejla Batina, Domenic Forte:
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, ASHES 2023, Copenhagen, Denmark, 30 November 2023. ACM 2023 [contents] - 2022
- Jens Trautmann, Nikolaos Patsiatzis, Andreas Becher, Stefan Wildermann, Jürgen Teich:
Putting IMT to the Test: Revisiting and Expanding Interval Matching Techniques and their Calibration for SCA. ASHES@CCS 2022: 65-74 - Muayad J. Aljafar, Florence Azaïs, Marie-Lise Flottes, Samuel Pagliarini:
Leveraging Layout-based Effects for Locking Analog ICs. ASHES@CCS 2022: 5-13 - Furkan Aydin, Aydin Aysu:
Exposing Side-Channel Leakage of SEAL Homomorphic Encryption Library. ASHES@CCS 2022: 95-100
skipping 75 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-30 22:33 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint