Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software. Gallais, J., Großschädl, J., Hanley, N., Kasper, M., Medwed, M., Regazzoni, F., Schmidt, J., Tillich, S., & Wójcik, M. In Chen, L. & Yung, M., editors, Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers, volume 6802, of Lecture Notes in Computer Science, pages 253–270, 2010. Springer.
Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software [link]Paper  doi  bibtex   
@inproceedings{DBLP:conf/intrust/GallaisGHKMRSTW10,
  author    = {Jean{-}Fran{\c{c}}ois Gallais and
               Johann Gro{\ss}sch{\"{a}}dl and
               Neil Hanley and
               Markus Kasper and
               Marcel Medwed and
               Francesco Regazzoni and
               J{\"{o}}rn{-}Marc Schmidt and
               Stefan Tillich and
               Marcin W{\'{o}}jcik},
  editor    = {Liqun Chen and
               Moti Yung},
  title     = {Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of
               Cryptographic Software},
  booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010,
               Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6802},
  pages     = {253--270},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-25283-9\_17},
  doi       = {10.1007/978-3-642-25283-9\_17},
  timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/intrust/GallaisGHKMRSTW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

Downloads: 0