Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software. Gallais, J., Großschädl, J., Hanley, N., Kasper, M., Medwed, M., Regazzoni, F., Schmidt, J., Tillich, S., & Wójcik, M. In Chen, L. & Yung, M., editors, Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers, volume 6802, of Lecture Notes in Computer Science, pages 253–270, 2010. Springer. Paper doi bibtex @inproceedings{DBLP:conf/intrust/GallaisGHKMRSTW10,
author = {Jean{-}Fran{\c{c}}ois Gallais and
Johann Gro{\ss}sch{\"{a}}dl and
Neil Hanley and
Markus Kasper and
Marcel Medwed and
Francesco Regazzoni and
J{\"{o}}rn{-}Marc Schmidt and
Stefan Tillich and
Marcin W{\'{o}}jcik},
editor = {Liqun Chen and
Moti Yung},
title = {Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of
Cryptographic Software},
booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010,
Beijing, China, December 13-15, 2010, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {6802},
pages = {253--270},
publisher = {Springer},
year = {2010},
url = {https://doi.org/10.1007/978-3-642-25283-9\_17},
doi = {10.1007/978-3-642-25283-9\_17},
timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/intrust/GallaisGHKMRSTW10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"6weFAMgReFcM9NNym","bibbaseid":"gallais-groschdl-hanley-kasper-medwed-regazzoni-schmidt-tillich-etal-hardwaretrojansforinducingoramplifyingsidechannelleakageofcryptographicsoftware-2010","downloads":0,"creationDate":"2018-06-05T13:49:47.070Z","title":"Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software","author_short":["Gallais, J.","Großschädl, J.","Hanley, N.","Kasper, M.","Medwed, M.","Regazzoni, F.","Schmidt, J.","Tillich, S.","Wójcik, M."],"year":2010,"bibtype":"inproceedings","biburl":"https://bibbase.org/f/QK7udauu9oYiG86Rs/bib.bib","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Jean-François"],"propositions":[],"lastnames":["Gallais"],"suffixes":[]},{"firstnames":["Johann"],"propositions":[],"lastnames":["Großschädl"],"suffixes":[]},{"firstnames":["Neil"],"propositions":[],"lastnames":["Hanley"],"suffixes":[]},{"firstnames":["Markus"],"propositions":[],"lastnames":["Kasper"],"suffixes":[]},{"firstnames":["Marcel"],"propositions":[],"lastnames":["Medwed"],"suffixes":[]},{"firstnames":["Francesco"],"propositions":[],"lastnames":["Regazzoni"],"suffixes":[]},{"firstnames":["Jörn-Marc"],"propositions":[],"lastnames":["Schmidt"],"suffixes":[]},{"firstnames":["Stefan"],"propositions":[],"lastnames":["Tillich"],"suffixes":[]},{"firstnames":["Marcin"],"propositions":[],"lastnames":["Wójcik"],"suffixes":[]}],"editor":[{"firstnames":["Liqun"],"propositions":[],"lastnames":["Chen"],"suffixes":[]},{"firstnames":["Moti"],"propositions":[],"lastnames":["Yung"],"suffixes":[]}],"title":"Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software","booktitle":"Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers","series":"Lecture Notes in Computer Science","volume":"6802","pages":"253–270","publisher":"Springer","year":"2010","url":"https://doi.org/10.1007/978-3-642-25283-9\\_17","doi":"10.1007/978-3-642-25283-9_17","timestamp":"Tue, 31 Mar 2020 01:00:00 +0200","biburl":"https://dblp.org/rec/conf/intrust/GallaisGHKMRSTW10.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/intrust/GallaisGHKMRSTW10,\n author = {Jean{-}Fran{\\c{c}}ois Gallais and\n Johann Gro{\\ss}sch{\\\"{a}}dl and\n Neil Hanley and\n Markus Kasper and\n Marcel Medwed and\n Francesco Regazzoni and\n J{\\\"{o}}rn{-}Marc Schmidt and\n Stefan Tillich and\n Marcin W{\\'{o}}jcik},\n editor = {Liqun Chen and\n Moti Yung},\n title = {Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of\n Cryptographic Software},\n booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010,\n Beijing, China, December 13-15, 2010, Revised Selected Papers},\n series = {Lecture Notes in Computer Science},\n volume = {6802},\n pages = {253--270},\n publisher = {Springer},\n year = {2010},\n url = {https://doi.org/10.1007/978-3-642-25283-9\\_17},\n doi = {10.1007/978-3-642-25283-9\\_17},\n timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/intrust/GallaisGHKMRSTW10.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Gallais, J.","Großschädl, J.","Hanley, N.","Kasper, M.","Medwed, M.","Regazzoni, F.","Schmidt, J.","Tillich, S.","Wójcik, M."],"editor_short":["Chen, L.","Yung, M."],"key":"DBLP:conf/intrust/GallaisGHKMRSTW10","id":"DBLP:conf/intrust/GallaisGHKMRSTW10","bibbaseid":"gallais-groschdl-hanley-kasper-medwed-regazzoni-schmidt-tillich-etal-hardwaretrojansforinducingoramplifyingsidechannelleakageofcryptographicsoftware-2010","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-642-25283-9\\_17"},"metadata":{"authorlinks":{"hanley, n":"https://neilhanley.gitlab.io/publications/"}},"downloads":0},"search_terms":["hardware","trojans","inducing","amplifying","side","channel","leakage","cryptographic","software","gallais","großschädl","hanley","kasper","medwed","regazzoni","schmidt","tillich","wójcik"],"keywords":[],"authorIDs":["bpHHxMcpBHxRWi2A3"],"dataSources":["H8x2obrhjRLyjakpF","ZuojF5jycEf8Xjgko","8gxn7AaKRh7GxNQNx","9LEB4ahCAz8Pkq58E","ZsvDCPRnhBRRCnWQ5","ogQFRFYiwHec9qRk5"]}