Exploring the Vulnerability of R-LWE Encryption to Fault Attacks. Valencia, F., Oder, T., Güneysu, T., & Regazzoni, F. In Goodacre, J., Luján, M., Agosta, G., Barenghi, A., Koren, I., & Pelosi, G., editors, Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, CS2 2018, Manchester, United Kingdom, January 24, 2018, pages 7–12, 2018. ACM. Paper doi bibtex @inproceedings{DBLP:conf/hipeac/ValenciaOGR18,
author = {Felipe Valencia and
Tobias Oder and
Tim G{\"{u}}neysu and
Francesco Regazzoni},
editor = {John Goodacre and
Mikel Luj{\'{a}}n and
Giovanni Agosta and
Alessandro Barenghi and
Israel Koren and
Gerardo Pelosi},
title = {Exploring the Vulnerability of {R-LWE} Encryption to Fault Attacks},
booktitle = {Proceedings of the Fifth Workshop on Cryptography and Security in
Computing Systems, {CS2} 2018, Manchester, United Kingdom, January
24, 2018},
pages = {7--12},
publisher = {{ACM}},
year = {2018},
url = {https://doi.org/10.1145/3178291.3178294},
doi = {10.1145/3178291.3178294},
timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/hipeac/ValenciaOGR18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"7ozzRiwfPGGra66nE","bibbaseid":"valencia-oder-gneysu-regazzoni-exploringthevulnerabilityofrlweencryptiontofaultattacks-2018","author_short":["Valencia, F.","Oder, T.","Güneysu, T.","Regazzoni, F."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Felipe"],"propositions":[],"lastnames":["Valencia"],"suffixes":[]},{"firstnames":["Tobias"],"propositions":[],"lastnames":["Oder"],"suffixes":[]},{"firstnames":["Tim"],"propositions":[],"lastnames":["Güneysu"],"suffixes":[]},{"firstnames":["Francesco"],"propositions":[],"lastnames":["Regazzoni"],"suffixes":[]}],"editor":[{"firstnames":["John"],"propositions":[],"lastnames":["Goodacre"],"suffixes":[]},{"firstnames":["Mikel"],"propositions":[],"lastnames":["Luján"],"suffixes":[]},{"firstnames":["Giovanni"],"propositions":[],"lastnames":["Agosta"],"suffixes":[]},{"firstnames":["Alessandro"],"propositions":[],"lastnames":["Barenghi"],"suffixes":[]},{"firstnames":["Israel"],"propositions":[],"lastnames":["Koren"],"suffixes":[]},{"firstnames":["Gerardo"],"propositions":[],"lastnames":["Pelosi"],"suffixes":[]}],"title":"Exploring the Vulnerability of R-LWE Encryption to Fault Attacks","booktitle":"Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, CS2 2018, Manchester, United Kingdom, January 24, 2018","pages":"7–12","publisher":"ACM","year":"2018","url":"https://doi.org/10.1145/3178291.3178294","doi":"10.1145/3178291.3178294","timestamp":"Tue, 31 Mar 2020 01:00:00 +0200","biburl":"https://dblp.org/rec/conf/hipeac/ValenciaOGR18.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/hipeac/ValenciaOGR18,\n author = {Felipe Valencia and\n Tobias Oder and\n Tim G{\\\"{u}}neysu and\n Francesco Regazzoni},\n editor = {John Goodacre and\n Mikel Luj{\\'{a}}n and\n Giovanni Agosta and\n Alessandro Barenghi and\n Israel Koren and\n Gerardo Pelosi},\n title = {Exploring the Vulnerability of {R-LWE} Encryption to Fault Attacks},\n booktitle = {Proceedings of the Fifth Workshop on Cryptography and Security in\n Computing Systems, {CS2} 2018, Manchester, United Kingdom, January\n 24, 2018},\n pages = {7--12},\n publisher = {{ACM}},\n year = {2018},\n url = {https://doi.org/10.1145/3178291.3178294},\n doi = {10.1145/3178291.3178294},\n timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/hipeac/ValenciaOGR18.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Valencia, F.","Oder, T.","Güneysu, T.","Regazzoni, F."],"editor_short":["Goodacre, J.","Luján, M.","Agosta, G.","Barenghi, A.","Koren, I.","Pelosi, G."],"key":"DBLP:conf/hipeac/ValenciaOGR18","id":"DBLP:conf/hipeac/ValenciaOGR18","bibbaseid":"valencia-oder-gneysu-regazzoni-exploringthevulnerabilityofrlweencryptiontofaultattacks-2018","role":"author","urls":{"Paper":"https://doi.org/10.1145/3178291.3178294"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/f/QK7udauu9oYiG86Rs/bib.bib","dataSources":["H8x2obrhjRLyjakpF","ZuojF5jycEf8Xjgko","8gxn7AaKRh7GxNQNx","9LEB4ahCAz8Pkq58E","ZsvDCPRnhBRRCnWQ5"],"keywords":[],"search_terms":["exploring","vulnerability","lwe","encryption","fault","attacks","valencia","oder","güneysu","regazzoni"],"title":"Exploring the Vulnerability of R-LWE Encryption to Fault Attacks","year":2018}