|
|
PROOFS 2021: Author IndexAuthor | Papers |
---|
A | Asano, Tamon | Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor | B | Boespflug, Etienne | Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities | Bu, Lei | Locality Based Cache Side-channel Attack Detection | C | Cheng, Wei | Towards Finding Best Linear Codes for Side-Channel Protections | F | Féliot, David | Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities | G | Guilley, Sylvain | Towards Finding Best Linear Codes for Side-Channel Protections | L | Lacombe, Guilhem | Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities | Liu, Yi | Towards Finding Best Linear Codes for Side-Channel Protections | M | Marzougui, Soundes | XMSS-based Chain of Trust | O | Ou, Changhai | Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations | P | Potet, Marie-Laure | Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities | Q | Qiao, Kexin | Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations | R | Rioul, Olivier | Towards Finding Best Linear Codes for Side-Channel Protections | S | Seifert, Jean-Pierre | XMSS-based Chain of Trust | Song, Fu | Locality Based Cache Side-channel Attack Detection | Sugawara, Takeshi | Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor | W | Wang, Limin | Locality Based Cache Side-channel Attack Detection | Z | Zhang, Fan | Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations | Zhang, Renjun | Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations | Zhou, Xinping | Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations |
|
|
|