Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Stoffelen, K."'
Publikováno v:
Schwabe, P.; Thériault, N. (ed.), Progress in Cryptology-LATINCRYPT 2019-6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2-4, 2019, Proceedings, pp. 323-340
Schwabe, P.; Thériault, N. (ed.), Progress in Cryptology-LATINCRYPT 2019-6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2-4, 2019, Proceedings, 323-340. Cham : Springer
STARTPAGE=323;ENDPAGE=340;ISSN=0302-9743;TITLE=Schwabe, P.; Thériault, N. (ed.), Progress in Cryptology-LATINCRYPT 2019-6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2-4, 2019, Proceedings
Schwabe, P.; Thériault, N. (ed.), Progress in Cryptology-LATINCRYPT 2019-6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2-4, 2019, Proceedings, 323-340. Cham : Springer
STARTPAGE=323;ENDPAGE=340;ISSN=0302-9743;TITLE=Schwabe, P.; Thériault, N. (ed.), Progress in Cryptology-LATINCRYPT 2019-6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2-4, 2019, Proceedings
Item does not contain fulltext Progress in Cryptology - LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2-4, 2019
Publikováno v:
Second PQC Standardization Conference: University of California, Santa Barbara and co-located with Crypto 2019, pp. 1-22
Second PQC Standardization Conference: University of California, Santa Barbara and co-located with Crypto 2019, 1-22. [S.l.] : CSRC
STARTPAGE=1;ENDPAGE=22;TITLE=Second PQC Standardization Conference: University of California, Santa Barbara and co-located with Crypto 2019
Second PQC Standardization Conference: University of California, Santa Barbara and co-located with Crypto 2019, 1-22. [S.l.] : CSRC
STARTPAGE=1;ENDPAGE=22;TITLE=Second PQC Standardization Conference: University of California, Santa Barbara and co-located with Crypto 2019
Contains fulltext : 210214.pdf (Author’s version preprint ) (Open Access) Second PQC Standardization Conference: University of California, Santa Barbara and co-located with Crypto 2019
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::36d950bccd100426eef7e5c02629cac0
https://hdl.handle.net/2066/210214
https://hdl.handle.net/2066/210214
Publikováno v:
Bilgin, B. (ed.), TIS'19: Proceedings of the ACM Workshop on Theory of Implementation Security Workshop, London United Kingdom November, 2019, 10–23. [S.l.] : Association for Computing Machinery
STARTPAGE=10–23;TITLE=Bilgin, B. (ed.), TIS'19: Proceedings of the ACM Workshop on Theory of Implementation Security Workshop, London United Kingdom November, 2019
Bilgin, B. (ed.), TIS'19: Proceedings of the ACM Workshop on Theory of Implementation Security Workshop, London United Kingdom November, 2019, pp. 10–23
TIS@CCS
STARTPAGE=10–23;TITLE=Bilgin, B. (ed.), TIS'19: Proceedings of the ACM Workshop on Theory of Implementation Security Workshop, London United Kingdom November, 2019
Bilgin, B. (ed.), TIS'19: Proceedings of the ACM Workshop on Theory of Implementation Security Workshop, London United Kingdom November, 2019, pp. 10–23
TIS@CCS
Masking is the best-researched countermeasure against side-channel analysis attacks. Even though masking was introduced almost 20 years ago, its efficient implementation continues to be an active research topic. Many of the existing works focus on th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ab33ee6254e2835e690b71f66d59acf9
https://hdl.handle.net/2066/214990
https://hdl.handle.net/2066/214990
Publikováno v:
Lecture notes in computer science ; 10815, 23-43. Cham : Springer
STARTPAGE=23;ENDPAGE=43;TITLE=Lecture notes in computer science ; 10815
COSADE 2018-Constructive Side-Channel Analysis and Secure Design-9th International Workshop.
COSADE 2018-Constructive Side-Channel Analysis and Secure Design-9th International Workshop., Apr 2018, Singapore, Singapore. pp.23-43
Fan, J. (ed.), Constructive Side-Channel Analysis and Secure Design: 9th International Workshop, COSADE 2018, Singapore, April 23–24, 2018, Proceedings, pp. 23-43
Constructive Side-Channel Analysis and Secure Design ISBN: 9783319896403
COSADE
STARTPAGE=23;ENDPAGE=43;TITLE=Lecture notes in computer science ; 10815
COSADE 2018-Constructive Side-Channel Analysis and Secure Design-9th International Workshop.
COSADE 2018-Constructive Side-Channel Analysis and Secure Design-9th International Workshop., Apr 2018, Singapore, Singapore. pp.23-43
Fan, J. (ed.), Constructive Side-Channel Analysis and Secure Design: 9th International Workshop, COSADE 2018, Singapore, April 23–24, 2018, Proceedings, pp. 23-43
Constructive Side-Channel Analysis and Secure Design ISBN: 9783319896403
COSADE
International audience; The cost of higher-order masking as a countermeasure against side-channel attacks is often considered too high for practical scenarios, as protected implementations become very slow. At Eurocrypt 2017, the bounded moment leaka
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::674f705222472992da94787deead608b
http://hdl.handle.net/2066/191739
http://hdl.handle.net/2066/191739
Publikováno v:
Avanzi, R.; Heys, H. (ed.), Selected Areas in Cryptography – SAC 2016: 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers, pp. 180-194
Selected Areas in Cryptography – SAC 2016, Lecture notes in computer science
Avanzi, R.; Heys, H. (ed.), Selected Areas in Cryptography – SAC 2016: 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers, 180-194. Cham : Springer International Publishing
STARTPAGE=180;ENDPAGE=194;ISSN=0302-9743;TITLE=Avanzi, R.; Heys, H. (ed.), Selected Areas in Cryptography – SAC 2016: 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers
Lecture Notes in Computer Science ISBN: 9783319694528
SAC
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Selected Areas in Cryptography – SAC 2016
Selected Areas in Cryptography – SAC 2016, Lecture notes in computer science
Avanzi, R.; Heys, H. (ed.), Selected Areas in Cryptography – SAC 2016: 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers, 180-194. Cham : Springer International Publishing
STARTPAGE=180;ENDPAGE=194;ISSN=0302-9743;TITLE=Avanzi, R.; Heys, H. (ed.), Selected Areas in Cryptography – SAC 2016: 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers
Lecture Notes in Computer Science ISBN: 9783319694528
SAC
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Selected Areas in Cryptography – SAC 2016
This paper describes highly-optimized AES-\(\{128,192,256\}\)-CTR assembly implementations for the popular ARM Cortex-M3 and M4 embedded microprocessors. These implementations are about twice as fast as existing implementations. Additionally, we prov
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::37940979fc81d6b183231fab172ecf24
https://hdl.handle.net/2066/178459
https://hdl.handle.net/2066/178459
Autor:
Stoffelen, K.
Publikováno v:
SPEED-B-Software performance enhancement for encryption and decryption, and benchmarking, October 19-21, 2016, Utrecht, The Netherlands, pp. 1-9
SPEED-B-Software performance enhancement for encryption and decryption, and benchmarking, October 19-21, 2016, Utrecht, The Netherlands, 1-9. [S.l.] : [S.n.]
STARTPAGE=1;ENDPAGE=9;TITLE=SPEED-B-Software performance enhancement for encryption and decryption, and benchmarking, October 19-21, 2016, Utrecht, The Netherlands
SPEED-B-Software performance enhancement for encryption and decryption, and benchmarking, October 19-21, 2016, Utrecht, The Netherlands, 1-9. [S.l.] : [S.n.]
STARTPAGE=1;ENDPAGE=9;TITLE=SPEED-B-Software performance enhancement for encryption and decryption, and benchmarking, October 19-21, 2016, Utrecht, The Netherlands
Contains fulltext : 166113.pdf (Publisher’s version ) (Open Access) SPEED-B - Software performance enhancement for encryption and decryption, and benchmarking, October 19-21, 2016, Utrecht, The Netherlands
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::8254f6640702a3c6a6541f3a9c97e92a
https://hdl.handle.net/2066/166113
https://hdl.handle.net/2066/166113
Autor:
Stoffelen, K., Peyrin, T.
Publikováno v:
Fast Software Encryption ISBN: 9783662529928
FSE
Peyrin, T. (ed.), Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers, pp. 140-160
Fast Software Encryption
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Fast Software Encryption
Peyrin, T. (ed.), Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers, 140-160. Berlin, Heidelberg : Springer Berlin Heidelberg
STARTPAGE=140;ENDPAGE=160;ISSN=0302-9743;TITLE=Peyrin, T. (ed.), Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers
FSE
Peyrin, T. (ed.), Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers, pp. 140-160
Fast Software Encryption
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Fast Software Encryption
Peyrin, T. (ed.), Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers, 140-160. Berlin, Heidelberg : Springer Berlin Heidelberg
STARTPAGE=140;ENDPAGE=160;ISSN=0302-9743;TITLE=Peyrin, T. (ed.), Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers
We explore the feasibility of applying SAT solvers to optimizing implementations of small functions such as S-boxes for multiple optimization criteria, e.g., the number of nonlinear gates and the number of gates. We provide optimized implementations
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::914597b100b3735d5b16db630bb27a28
https://doi.org/10.1007/978-3-662-52993-5_8
https://doi.org/10.1007/978-3-662-52993-5_8
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.