Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Papachristodoulou, L"'
Autor:
Fredrich, D, Akbar, AM, Bin Mohd Fadzil, MF, Giorgallis, A, Kruse, A, Liniger, N, Papachristodoulou, L, Giusti, A
A numerical framework for the ‘real-time’ estimation of the infection risk from airborne diseases (e.g., SARS-CoV-2) in indoor spaces such as hospitals, restaurants, cinemas or teaching rooms is proposed. The developed model is based on the use o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1032::5dbbb2843da9ac0e369dfa65fbb2a57b
http://hdl.handle.net/10044/1/102657
http://hdl.handle.net/10044/1/102657
Autor:
Papachristodoulou, L.
Contains fulltext : 201163.pdf (Publisher’s version ) (Open Access) Radboud University, 22 maart 2019 Promotor : Batina, L. xxx, 204 p.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::950fa81130c76bd040e6d3040e596db4
http://hdl.handle.net/2066/201163
http://hdl.handle.net/2066/201163
Autor:
Papachristodoulou, L., Batina, L., Mentens, N., Sklavos, N., Chaves, R., Natale, G. Di, Regazzoni, F.
Publikováno v:
Hardware Security and Trust ISBN: 9783319443164
Sklavos, N.; Chaves, R.; Natale, G. Di (ed.), Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment, pp. 49-76
Sklavos, N.; Chaves, R.; Natale, G. Di (ed.), Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment, 49-76. Cham : Springer International Publishing
STARTPAGE=49;ENDPAGE=76;TITLE=Sklavos, N.; Chaves, R.; Natale, G. Di (ed.), Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment
Sklavos, N.; Chaves, R.; Natale, G. Di (ed.), Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment, pp. 49-76
Sklavos, N.; Chaves, R.; Natale, G. Di (ed.), Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment, 49-76. Cham : Springer International Publishing
STARTPAGE=49;ENDPAGE=76;TITLE=Sklavos, N.; Chaves, R.; Natale, G. Di (ed.), Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment
The emerging need for secure communications in embedded systems is constantly threatened by sophisticated side-channel analysis (SCA) attacks.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::676ffad8bcd84f7daabb044562414d0a
https://doi.org/10.1007/978-3-319-44318-8_3
https://doi.org/10.1007/978-3-319-44318-8_3
Autor:
Dugardin, M., Papachristodoulou, L., Najm, Z., Batina, L., Danger, J.-L., Guilley, S., Standaert, F.-X., Oswald, E.
Publikováno v:
Constructive Side-Channel Analysis and Secure Design7th International Workshop, COSADE 2016Graz, Austria, April 14–15, 2016Revised Selected Papers
Constructive Side-Channel Analysis and Secure Design-COSADE 2016
Constructive Side-Channel Analysis and Secure Design-COSADE 2016, Apr 2016, Graz, Austria. pp 88-108
Standaert, F.-X.; Oswald, E. (ed.), Constructive Side-Channel Analysis and Secure Design: 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers, pp. 88-108
Standaert, F.-X.; Oswald, E. (ed.), Constructive Side-Channel Analysis and Secure Design: 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers, 88-108. Cham : Springer International Publishing
STARTPAGE=88;ENDPAGE=108;ISSN=0302-9743;TITLE=Standaert, F.-X.; Oswald, E. (ed.), Constructive Side-Channel Analysis and Secure Design: 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers
Constructive Side-Channel Analysis and Secure Design-COSADE 2016
Constructive Side-Channel Analysis and Secure Design-COSADE 2016, Apr 2016, Graz, Austria. pp 88-108
Standaert, F.-X.; Oswald, E. (ed.), Constructive Side-Channel Analysis and Secure Design: 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers, pp. 88-108
Standaert, F.-X.; Oswald, E. (ed.), Constructive Side-Channel Analysis and Secure Design: 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers, 88-108. Cham : Springer International Publishing
STARTPAGE=88;ENDPAGE=108;ISSN=0302-9743;TITLE=Standaert, F.-X.; Oswald, E. (ed.), Constructive Side-Channel Analysis and Secure Design: 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers
International audience; Recent side-channel attacks on elliptic curve algorithms have shown that the security of these cryptosystems is a matter of serious concern. The development of techniques in the area of Template Attacks makes it feasible to ex
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::025a1a607a1bfa31d6b8b175228e5951
https://hal.archives-ouvertes.fr/hal-01362466
https://hal.archives-ouvertes.fr/hal-01362466
Publikováno v:
DTIS
Baktir, S. (ed.), DTIS 2016 : 2016 11TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA : April 12th-14th 2016 Istanbul, Turkey. Proceedings, 1-4. Piscataway : IEEE
STARTPAGE=1;ENDPAGE=4;TITLE=Baktir, S. (ed.), DTIS 2016 : 2016 11TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA : April 12th-14th 2016 Istanbul, Turkey. Proceedings
Baktir, S. (ed.), DTIS 2016 : 2016 11TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA : April 12th-14th 2016 Istanbul, Turkey. Proceedings, pp. 1-4
Baktir, S. (ed.), DTIS 2016 : 2016 11TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA : April 12th-14th 2016 Istanbul, Turkey. Proceedings, 1-4. Piscataway : IEEE
STARTPAGE=1;ENDPAGE=4;TITLE=Baktir, S. (ed.), DTIS 2016 : 2016 11TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA : April 12th-14th 2016 Istanbul, Turkey. Proceedings
Baktir, S. (ed.), DTIS 2016 : 2016 11TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA : April 12th-14th 2016 Istanbul, Turkey. Proceedings, pp. 1-4
Implementation attacks and more specifically Power Analysis (PA) (the dominant type of side channel attack) and fault injection (FA) attacks constitute a pragmatic hazard for scalar multiplication, the main operation behind Elliptic Curve Cryptograph
Publikováno v:
Robinson, W.H. (ed.), HOST 2016: Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) : 3-5 May 2016, The Ritz-Carlton McLean, VA, USA, 242-247. Piscataway : IEEE
STARTPAGE=242;ENDPAGE=247;TITLE=Robinson, W.H. (ed.), HOST 2016: Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) : 3-5 May 2016, The Ritz-Carlton McLean, VA, USA
Robinson, W.H. (ed.), HOST 2016: Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) : 3-5 May 2016, The Ritz-Carlton McLean, VA, USA, pp. 242-247
HOST
STARTPAGE=242;ENDPAGE=247;TITLE=Robinson, W.H. (ed.), HOST 2016: Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) : 3-5 May 2016, The Ritz-Carlton McLean, VA, USA
Robinson, W.H. (ed.), HOST 2016: Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) : 3-5 May 2016, The Ritz-Carlton McLean, VA, USA, pp. 242-247
HOST
Template attacks constitute a powerful side-channel attack technique that is shown to be efficient in breaking many secure cryptographic implementations. This type of attack consists of two phases, the profiling of the device (template building) and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::46a261a59f64760be2af30834d75d640
http://hdl.handle.net/2066/159598
http://hdl.handle.net/2066/159598
Autor:
Bernstein, D.J., Hopwood, D., Hülsing, A.T., Lange, T., Niederhagen, R.F., Papachristodoulou, L., Schwabe, P., Wilcox O'Hearn, Z.
This paper introduces a high-security post-quantum stateless hash-based signature scheme that signs hundreds of messages per second on a modern 4-core 3.5GHz Intel CPU. Signatures are 41~KB, public keys are 1~KB, and private keys are 1~KB. The signat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::85a26cc7d91abb2b233bcb109ee9a2e8
https://research.tue.nl/nl/publications/42d6f5ad-3d05-4574-9597-f27a84873129
https://research.tue.nl/nl/publications/42d6f5ad-3d05-4574-9597-f27a84873129
Autor:
Batina, L., Chmielewski, Ł., Papachristodoulou, L., Schwabe, P., Tunstall, M., Meier, W., Mukhopadhyay, D.
Publikováno v:
Meier, W.; Mukhopadhyay, D. (ed.), Progress in Cryptology--INDOCRYPT 2014, pp. 21-36
Lecture Notes in Computer Science, 21-36. Berlin : Springer International Publishing
STARTPAGE=21;ENDPAGE=36;TITLE=Lecture Notes in Computer Science
Progress in Cryptology--INDOCRYPT 2014 ISBN: 9783319130385
INDOCRYPT
Lecture Notes in Computer Science, 21-36. Berlin : Springer International Publishing
STARTPAGE=21;ENDPAGE=36;TITLE=Lecture Notes in Computer Science
Progress in Cryptology--INDOCRYPT 2014 ISBN: 9783319130385
INDOCRYPT
In the context of attacking elliptic-curve scalar multiplication with template attacks, one can interleave template generation and template matching to reduce the amount of template traces. This paper enhances the power of this technique by defining
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::06cf92d925eb10b646916feac732bf69
https://hdl.handle.net/2066/132643
https://hdl.handle.net/2066/132643
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.