Aiding Side-Channel Attacks on Cryptographic Software With Satisfiability-Based Analysis. Potlapally, N. R., Raghunathan, A., Ravi, S., Jha, N. K., & Lee, R. B. IEEE Trans. VLSI Syst., 15(4):465–470, 2007.
Paper doi bibtex @article{DBLP:journals/tvlsi/PotlapallyRRJL07,
author = {Nachiketh R. Potlapally and
Anand Raghunathan and
Srivaths Ravi and
Niraj K. Jha and
Ruby B. Lee},
title = {Aiding Side-Channel Attacks on Cryptographic Software With Satisfiability-Based
Analysis},
journal = {{IEEE} Trans. {VLSI} Syst.},
volume = {15},
number = {4},
pages = {465--470},
year = {2007},
url = {https://doi.org/10.1109/TVLSI.2007.893665},
doi = {10.1109/TVLSI.2007.893665},
timestamp = {Thu, 18 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/tvlsi/PotlapallyRRJL07},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"cAoNJ2FbeGr9tGEJH","bibbaseid":"potlapally-raghunathan-ravi-jha-lee-aidingsidechannelattacksoncryptographicsoftwarewithsatisfiabilitybasedanalysis-2007","downloads":0,"creationDate":"2018-06-20T07:11:31.591Z","title":"Aiding Side-Channel Attacks on Cryptographic Software With Satisfiability-Based Analysis","author_short":["Potlapally, N. R.","Raghunathan, A.","Ravi, S.","Jha, N. K.","Lee, R. B."],"year":2007,"bibtype":"article","biburl":"https://dblp.org/pid/74/3747.bib","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Nachiketh","R."],"propositions":[],"lastnames":["Potlapally"],"suffixes":[]},{"firstnames":["Anand"],"propositions":[],"lastnames":["Raghunathan"],"suffixes":[]},{"firstnames":["Srivaths"],"propositions":[],"lastnames":["Ravi"],"suffixes":[]},{"firstnames":["Niraj","K."],"propositions":[],"lastnames":["Jha"],"suffixes":[]},{"firstnames":["Ruby","B."],"propositions":[],"lastnames":["Lee"],"suffixes":[]}],"title":"Aiding Side-Channel Attacks on Cryptographic Software With Satisfiability-Based Analysis","journal":"IEEE Trans. VLSI Syst.","volume":"15","number":"4","pages":"465–470","year":"2007","url":"https://doi.org/10.1109/TVLSI.2007.893665","doi":"10.1109/TVLSI.2007.893665","timestamp":"Thu, 18 May 2017 01:00:00 +0200","biburl":"https://dblp.org/rec/bib/journals/tvlsi/PotlapallyRRJL07","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/tvlsi/PotlapallyRRJL07,\n author = {Nachiketh R. Potlapally and\n Anand Raghunathan and\n Srivaths Ravi and\n Niraj K. Jha and\n Ruby B. Lee},\n title = {Aiding Side-Channel Attacks on Cryptographic Software With Satisfiability-Based\n Analysis},\n journal = {{IEEE} Trans. {VLSI} Syst.},\n volume = {15},\n number = {4},\n pages = {465--470},\n year = {2007},\n url = {https://doi.org/10.1109/TVLSI.2007.893665},\n doi = {10.1109/TVLSI.2007.893665},\n timestamp = {Thu, 18 May 2017 01:00:00 +0200},\n biburl = {https://dblp.org/rec/bib/journals/tvlsi/PotlapallyRRJL07},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Potlapally, N. R.","Raghunathan, A.","Ravi, S.","Jha, N. K.","Lee, R. B."],"key":"DBLP:journals/tvlsi/PotlapallyRRJL07","id":"DBLP:journals/tvlsi/PotlapallyRRJL07","bibbaseid":"potlapally-raghunathan-ravi-jha-lee-aidingsidechannelattacksoncryptographicsoftwarewithsatisfiabilitybasedanalysis-2007","role":"author","urls":{"Paper":"https://doi.org/10.1109/TVLSI.2007.893665"},"downloads":0},"search_terms":["aiding","side","channel","attacks","cryptographic","software","satisfiability","based","analysis","potlapally","raghunathan","ravi","jha","lee"],"keywords":[],"authorIDs":[],"dataSources":["QATSsZPCAGgNRpLA3"]}