Home
EPiC Series
Kalpa Publications
Preprints
For Authors
For Editors
Volume
•
Abstracts
•
Preface
•
Authors
•
Keywords
•
BibTex Entries
PROOFS 2021: Keyword Index
Keyword
Papers
b
Bit-interaction leakage
Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
bootloader use-case
Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities
c
Chain of Trust
XMSS-based Chain of Trust
Code-based Masking Scheme
Towards Finding Best Linear Codes for Side-Channel Protections
d
Detection based defenses
Locality Based Cache Side-channel Attack Detection
Dilithium
XMSS-based Chain of Trust
f
fault injection robustness
Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities
FLSS
Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
h
handshake protocol
XMSS-based Chain of Trust
high-level information
Locality Based Cache Side-channel Attack Detection
i
Information-Theoretic Metric
Towards Finding Best Linear Codes for Side-Channel Protections
l
linear code
Towards Finding Best Linear Codes for Side-Channel Protections
locality
Locality Based Cache Side-channel Attack Detection
m
Masking
Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
multiple-layer sieve
Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
p
post-quantum cryptography
XMSS-based Chain of Trust
r
RISC-V
Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
s
serial implementation
Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
Share-slicing
Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
Side Channel Attack
Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
side-channel analysis
Towards Finding Best Linear Codes for Side-Channel Protections
side-channel attacks
Locality Based Cache Side-channel Attack Detection
simulation
Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
SMLS
Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
source code static analysis
Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities
stacking attack
Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
symbolic execution
Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities
t
TLSs
Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
w
weight distribution
Towards Finding Best Linear Codes for Side-Channel Protections
x
XMSS
XMSS-based Chain of Trust
Copyright © 2012-2024 easychair.org. All rights reserved.