264 papers found
Refreshing results…
Parsimonious design strategy for linear layers with high diffusion in block ciphers
Theory and Application of Delay Constraints in Arbiter PUF
Towards Ideal Arbiter PUF Design on Xilinx FPGA: A Practitioner's Perspective (poster)
poster portrait
Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms
Redefining the transparency order
ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF(p)
Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis
Embedded Security
A Practical Template Attack on MICKEY-128 2.0 Using PSO Generated IVs and LS-SVM
PUFs as Promising Tools for Security in Internet of Things
Fault Based Almost Universal Forgeries on CLOC and SILC
Improved Atomicity to Prevent HCCA on NIST Curves
Using Tweaks to Design Fault Resistant Ciphers
A Formal Security Analysis of Even-Odd Sequential Prefetching in Profiled Cache-Timing Attacks
Fault Attacks on AES and Their Countermeasures
From theory to practice of private circuit: A cautionary note
Towards Ideal Arbiter PUF Design on Xilinx FPGA: A Practitioner's Perspective
A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks
Reaching the Limit of Nonprofiling DPA
Missing publications? Read more about our data sources.