Zobrazeno 1 - 10
of 14
pro vyhledávání: '"van Woudenberg, Jasper"'
Autor:
Kiaei, Pantea, Yao, Yuan, Liu, Zhenyuan, Fern, Nicole, Breunesse, Cees-Bart, Van Woudenberg, Jasper, Gillis, Kate, Dich, Alex, Grossmann, Peter, Schaumont, Patrick
While side-channel leakage is traditionally evaluated from a fabricated chip, it is more time-efficient and cost-effective to do so during the design phase of the chip. We present a methodology to rank the gates of a design according to their contrib
Externí odkaz:
http://arxiv.org/abs/2204.11972
Autor:
Kiaei, Pantea, Breunesse, Cees-Bart, Ahmadi, Mohsen, Schaumont, Patrick, van Woudenberg, Jasper
Fault injection attacks can cause errors in software for malicious purposes. Oftentimes, vulnerable points of a program are detected after its development. It is therefore critical for the user of the program to be able to apply last-minute security
Externí odkaz:
http://arxiv.org/abs/2011.14067
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
van Woudenberg, Jasper, Breunesse, Cees-Bart, Velegalati, Rajesh, Yalla, Panasayya, Gonzalez, Sergio
Publikováno v:
ACM International Conference Proceeding Series; 12/5/2017, p1-9, 9p
Publikováno v:
Topics in Cryptology - CT-RSA 2012; 2012, p383-397, 15p
Publikováno v:
Topics in Cryptology - Ct-rsa 2011; 2011, p77-88, 12p
Publikováno v:
Topics in Cryptology - Ct-rsa 2011; 2011, p104-119, 16p
Publikováno v:
Innovations in Systems & Software Engineering; Mar2020, Vol. 16 Issue 1, p87-97, 11p
Autor:
Dominik Merli
This practical guide to building embedded and IoT devices securely is an essential resource for current and future developers tasked with protecting users from the potential threats of these ubiquitous devices.As an engineer, you know that countless
Autor:
Emmanuel Prouff
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop, COSADE 2013, held in Paris, France, in March 2013. The 13 revised full papers presented together with two invited talks were carefully select