Securing Hardware Accelerators: A New Challenge for High-Level Synthesis.
Pilato, C.; Garg, S.; Wu, K.; Karri, R.; and Regazzoni, F.
IEEE Embed. Syst. Lett., 10(3): 77–80. 2018.
Paper
doi
link
bibtex
@article{DBLP:journals/esl/PilatoGWKR18,
author = {Christian Pilato and
Siddharth Garg and
Kaijie Wu and
Ramesh Karri and
Francesco Regazzoni},
title = {Securing Hardware Accelerators: {A} New Challenge for High-Level Synthesis},
journal = {{IEEE} Embed. Syst. Lett.},
volume = {10},
number = {3},
pages = {77--80},
year = {2018},
url = {https://doi.org/10.1109/LES.2017.2774800},
doi = {10.1109/LES.2017.2774800},
timestamp = {Thu, 10 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/esl/PilatoGWKR18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Customized Instructions for Protection Against Memory Integrity Attacks.
Roy, D. B.; Alam, M.; Bhattacharya, S.; Govindan, V.; Regazzoni, F.; Chakraborty, R. S.; and Mukhopadhyay, D.
IEEE Embed. Syst. Lett., 10(3): 91–94. 2018.
Paper
doi
link
bibtex
@article{DBLP:journals/esl/RoyABGRCM18,
author = {Debapriya Basu Roy and
Manaar Alam and
Sarani Bhattacharya and
Vidya Govindan and
Francesco Regazzoni and
Rajat Subhra Chakraborty and
Debdeep Mukhopadhyay},
title = {Customized Instructions for Protection Against Memory Integrity Attacks},
journal = {{IEEE} Embed. Syst. Lett.},
volume = {10},
number = {3},
pages = {91--94},
year = {2018},
url = {https://doi.org/10.1109/LES.2018.2828506},
doi = {10.1109/LES.2018.2828506},
timestamp = {Thu, 10 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/esl/RoyABGRCM18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography.
Howe, J.; Khalid, A.; Rafferty, C.; Regazzoni, F.; and O'Neill, M.
IEEE Trans. Computers, 67(3): 322–334. 2018.
Paper
doi
link
bibtex
@article{DBLP:journals/tc/HoweKRRO18,
author = {James Howe and
Ayesha Khalid and
Ciara Rafferty and
Francesco Regazzoni and
M{\'{a}}ire O'Neill},
title = {On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography},
journal = {{IEEE} Trans. Computers},
volume = {67},
number = {3},
pages = {322--334},
year = {2018},
url = {https://doi.org/10.1109/TC.2016.2642962},
doi = {10.1109/TC.2016.2642962},
timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tc/HoweKRRO18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Towards Low Energy Stream Ciphers.
Banik, S.; Mikhalev, V.; Armknecht, F.; Isobe, T.; Meier, W.; Bogdanov, A.; Watanabe, Y.; and Regazzoni, F.
IACR Trans. Symmetric Cryptol., 2018(2): 1–19. 2018.
Paper
doi
link
bibtex
@article{DBLP:journals/tosc/BanikMAIMBWR18,
author = {Subhadeep Banik and
Vasily Mikhalev and
Frederik Armknecht and
Takanori Isobe and
Willi Meier and
Andrey Bogdanov and
Yuhei Watanabe and
Francesco Regazzoni},
title = {Towards Low Energy Stream Ciphers},
journal = {{IACR} Trans. Symmetric Cryptol.},
volume = {2018},
number = {2},
pages = {1--19},
year = {2018},
url = {https://doi.org/10.13154/tosc.v2018.i2.1-19},
doi = {10.13154/tosc.v2018.i2.1-19},
timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tosc/BanikMAIMBWR18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
SCA-Resistance for AES: How Cheap Can We Go?.
Chaves, R.; Chmielewski, L.; Regazzoni, F.; and Batina, L.
In Joux, A.; Nitaj, A.; and Rachidi, T., editor(s),
Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings, volume 10831, of
Lecture Notes in Computer Science, pages 107–123, 2018. Springer
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/africacrypt/ChavesCRB18,
author = {Ricardo Chaves and
Lukasz Chmielewski and
Francesco Regazzoni and
Lejla Batina},
editor = {Antoine Joux and
Abderrahmane Nitaj and
Tajjeeddine Rachidi},
title = {SCA-Resistance for {AES:} How Cheap Can We Go?},
booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference
on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {10831},
pages = {107--123},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-319-89339-6\_7},
doi = {10.1007/978-3-319-89339-6\_7},
timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/africacrypt/ChavesCRB18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
ASHES 2018- Workshop on Attacks and Solutions in Hardware Security.
Chang, C.; Guajardo, J.; Holcomb, D. E.; Regazzoni, F.; and Rührmair, U.
In Lie, D.; Mannan, M.; Backes, M.; and Wang, X., editor(s),
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018, pages 2168–2170, 2018. ACM
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/ccs/ChangGHRR18,
author = {Chip{-}Hong Chang and
Jorge Guajardo and
Daniel E. Holcomb and
Francesco Regazzoni and
Ulrich R{\"{u}}hrmair},
editor = {David Lie and
Mohammad Mannan and
Michael Backes and
XiaoFeng Wang},
title = {{ASHES} 2018- Workshop on Attacks and Solutions in Hardware Security},
booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2018, Toronto, ON, Canada, October
15-19, 2018},
pages = {2168--2170},
publisher = {{ACM}},
year = {2018},
url = {https://doi.org/10.1145/3243734.3243873},
doi = {10.1145/3243734.3243873},
timestamp = {Tue, 10 Nov 2020 20:00:51 +0100},
biburl = {https://dblp.org/rec/conf/ccs/ChangGHRR18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Vectorizing Higher-Order Masking.
Grégoire, B.; Papagiannopoulos, K.; Schwabe, P.; and Stoffelen, K.
In Fan, J.; and Gierlichs, B., editor(s),
Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018, Proceedings, volume 10815, of
Lecture Notes in Computer Science, pages 23–43, 2018. Springer
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/cosade/GregoirePSS18,
author = {Benjamin Gr{\'{e}}goire and
Kostas Papagiannopoulos and
Peter Schwabe and
Ko Stoffelen},
editor = {Junfeng Fan and
Benedikt Gierlichs},
title = {Vectorizing Higher-Order Masking},
booktitle = {Constructive Side-Channel Analysis and Secure Design - 9th International
Workshop, {COSADE} 2018, Singapore, April 23-24, 2018, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {10815},
pages = {23--43},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-319-89641-0\_2},
doi = {10.1007/978-3-319-89641-0\_2},
timestamp = {Tue, 14 May 2019 10:00:39 +0200},
biburl = {https://dblp.org/rec/conf/cosade/GregoirePSS18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
TAO: techniques for algorithm-level obfuscation during high-level synthesis.
Pilato, C.; Regazzoni, F.; Karri, R.; and Garg, S.
In
Proceedings of the 55th Annual Design Automation Conference, DAC 2018, San Francisco, CA, USA, June 24-29, 2018, pages 155:1–155:6, 2018. ACM
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/dac/PilatoRKG18,
author = {Christian Pilato and
Francesco Regazzoni and
Ramesh Karri and
Siddharth Garg},
title = {{TAO:} techniques for algorithm-level obfuscation during high-level
synthesis},
booktitle = {Proceedings of the 55th Annual Design Automation Conference, {DAC}
2018, San Francisco, CA, USA, June 24-29, 2018},
pages = {155:1--155:6},
publisher = {{ACM}},
year = {2018},
url = {https://doi.org/10.1145/3195970.3196126},
doi = {10.1145/3195970.3196126},
timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/dac/PilatoRKG18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Rethinking Secure FPGAs: Towards a Cryptography-Friendly Configurable Cell Architecture and Its Automated Design Flow.
Mentens, N.; Charbon, E.; and Regazzoni, F.
In
26th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, FCCM 2018, Boulder, CO, USA, April 29 - May 1, 2018, pages 215, 2018. IEEE Computer Society
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/fccm/MentensCR18,
author = {Nele Mentens and
Edoardo Charbon and
Francesco Regazzoni},
title = {Rethinking Secure FPGAs: Towards a Cryptography-Friendly Configurable
Cell Architecture and Its Automated Design Flow},
booktitle = {26th {IEEE} Annual International Symposium on Field-Programmable Custom
Computing Machines, {FCCM} 2018, Boulder, CO, USA, April 29 - May
1, 2018},
pages = {215},
publisher = {{IEEE} Computer Society},
year = {2018},
url = {https://doi.org/10.1109/FCCM.2018.00049},
doi = {10.1109/FCCM.2018.00049},
timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/fccm/MentensCR18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Physical Protection of Lattice-Based Cryptography: Challenges and Solutions.
Khalid, A.; Oder, T.; Valencia, F.; O'Neill, M.; Güneysu, T.; and Regazzoni, F.
In Chen, D.; Homayoun, H.; and Taskin, B., editor(s),
Proceedings of the 2018 on Great Lakes Symposium on VLSI, GLSVLSI 2018, Chicago, IL, USA, May 23-25, 2018, pages 365–370, 2018. ACM
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/glvlsi/KhalidOVOGR18,
author = {Ayesha Khalid and
Tobias Oder and
Felipe Valencia and
M{\'{a}}ire O'Neill and
Tim G{\"{u}}neysu and
Francesco Regazzoni},
editor = {Deming Chen and
Houman Homayoun and
Baris Taskin},
title = {Physical Protection of Lattice-Based Cryptography: Challenges and
Solutions},
booktitle = {Proceedings of the 2018 on Great Lakes Symposium on VLSI, {GLSVLSI}
2018, Chicago, IL, USA, May 23-25, 2018},
pages = {365--370},
publisher = {{ACM}},
year = {2018},
url = {https://doi.org/10.1145/3194554.3194616},
doi = {10.1145/3194554.3194616},
timestamp = {Wed, 10 Mar 2021 14:55:38 +0100},
biburl = {https://dblp.org/rec/conf/glvlsi/KhalidOVOGR18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Exploring the Vulnerability of R-LWE Encryption to Fault Attacks.
Valencia, F.; Oder, T.; Güneysu, T.; and Regazzoni, F.
In Goodacre, J.; Luján, M.; Agosta, G.; Barenghi, A.; Koren, I.; and Pelosi, G., editor(s),
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, CS2 2018, Manchester, United Kingdom, January 24, 2018, pages 7–12, 2018. ACM
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/hipeac/ValenciaOGR18,
author = {Felipe Valencia and
Tobias Oder and
Tim G{\"{u}}neysu and
Francesco Regazzoni},
editor = {John Goodacre and
Mikel Luj{\'{a}}n and
Giovanni Agosta and
Alessandro Barenghi and
Israel Koren and
Gerardo Pelosi},
title = {Exploring the Vulnerability of {R-LWE} Encryption to Fault Attacks},
booktitle = {Proceedings of the Fifth Workshop on Cryptography and Security in
Computing Systems, {CS2} 2018, Manchester, United Kingdom, January
24, 2018},
pages = {7--12},
publisher = {{ACM}},
year = {2018},
url = {https://doi.org/10.1145/3178291.3178294},
doi = {10.1145/3178291.3178294},
timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/hipeac/ValenciaOGR18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Inverse gating for low energy encryption.
Banik, S.; Bogdanov, A.; Regazzoni, F.; Isobe, T.; Hiwatari, H.; and Akishita, T.
In
2018 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2018, Washington, DC, USA, April 30 - May 4, 2018, pages 173–176, 2018. IEEE Computer Society
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/host/BanikBRIHA18,
author = {Subhadeep Banik and
Andrey Bogdanov and
Francesco Regazzoni and
Takanori Isobe and
Harunaga Hiwatari and
Toru Akishita},
title = {Inverse gating for low energy encryption},
booktitle = {2018 {IEEE} International Symposium on Hardware Oriented Security
and Trust, {HOST} 2018, Washington, DC, USA, April 30 - May 4, 2018},
pages = {173--176},
publisher = {{IEEE} Computer Society},
year = {2018},
url = {https://doi.org/10.1109/HST.2018.8383909},
doi = {10.1109/HST.2018.8383909},
timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/host/BanikBRIHA18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Security: the dark side of approximate computing?.
Regazzoni, F.; Alippi, C.; and Polian, I.
In Bahar, I., editor(s),
Proceedings of the International Conference on Computer-Aided Design, ICCAD 2018, San Diego, CA, USA, November 05-08, 2018, pages 44, 2018. ACM
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/iccad/RegazzoniAP18,
author = {Francesco Regazzoni and
Cesare Alippi and
Ilia Polian},
editor = {Iris Bahar},
title = {Security: the dark side of approximate computing?},
booktitle = {Proceedings of the International Conference on Computer-Aided Design,
{ICCAD} 2018, San Diego, CA, USA, November 05-08, 2018},
pages = {44},
publisher = {{ACM}},
year = {2018},
url = {https://doi.org/10.1145/3240765.3243497},
doi = {10.1145/3240765.3243497},
timestamp = {Mon, 09 Aug 2021 14:54:01 +0200},
biburl = {https://dblp.org/rec/conf/iccad/RegazzoniAP18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based Cryptography.
Khalid, A.; Howe, J.; Rafferty, C.; Regazzoni, F.; and O'Neill, M.
In
IEEE International Symposium on Circuits and Systems, ISCAS 2018, 27-30 May 2018, Florence, Italy, pages 1–5, 2018. IEEE
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/iscas/KhalidHRRO18,
author = {Ayesha Khalid and
James Howe and
Ciara Rafferty and
Francesco Regazzoni and
M{\'{a}}ire O'Neill},
title = {Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based
Cryptography},
booktitle = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2018,
27-30 May 2018, Florence, Italy},
pages = {1--5},
publisher = {{IEEE}},
year = {2018},
url = {https://doi.org/10.1109/ISCAS.2018.8351009},
doi = {10.1109/ISCAS.2018.8351009},
timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/iscas/KhalidHRRO18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Session details: Security threats caused by novel technologies.
Najm, Z.; Flórez, M. J. S.; and Regazzoni, F.
In Mudge, T. N.; and Pnevmatikatos, D. N., editor(s),
Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation, Pythagorion, Greece, July 15-19, 2018, 2018. ACM
Paper
link
bibtex
@inproceedings{DBLP:conf/samos/NajmFR18,
author = {Zakaria Najm and
Martha Johanna Sep{\'{u}}lveda Fl{\'{o}}rez and
Francesco Regazzoni},
editor = {Trevor N. Mudge and
Dionisios N. Pnevmatikatos},
title = {Session details: Security threats caused by novel technologies},
booktitle = {Proceedings of the 18th International Conference on Embedded Computer
Systems: Architectures, Modeling, and Simulation, Pythagorion, Greece,
July 15-19, 2018},
publisher = {{ACM}},
year = {2018},
url = {https://dl.acm.org/citation.cfm?id=3306460},
timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/samos/NajmFR18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Quantum era challenges for classical computers.
Regazzoni, F.; Fowler, A. G.; and Polian, I.
In Mudge, T. N.; and Pnevmatikatos, D. N., editor(s),
Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation, Pythagorion, Greece, July 15-19, 2018, pages 173–178, 2018. ACM
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/samos/RegazzoniFP18,
author = {Francesco Regazzoni and
Austin G. Fowler and
Ilia Polian},
editor = {Trevor N. Mudge and
Dionisios N. Pnevmatikatos},
title = {Quantum era challenges for classical computers},
booktitle = {Proceedings of the 18th International Conference on Embedded Computer
Systems: Architectures, Modeling, and Simulation, Pythagorion, Greece,
July 15-19, 2018},
pages = {173--178},
publisher = {{ACM}},
year = {2018},
url = {https://doi.org/10.1145/3229631.3264737},
doi = {10.1145/3229631.3264737},
timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/samos/RegazzoniFP18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Lightweight Circuits with Shift and Swap.
Banik, S.; Regazzoni, F.; and Vaudenay, S.
IACR Cryptol. ePrint Arch.,1114. 2018.
Paper
link
bibtex
@article{DBLP:journals/iacr/BanikRV18,
author = {Subhadeep Banik and
Francesco Regazzoni and
Serge Vaudenay},
title = {Lightweight Circuits with Shift and Swap},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {1114},
year = {2018},
url = {https://eprint.iacr.org/2018/1114},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/BanikRV18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Vectorizing Higher-Order Masking.
Grégoire, B.; Papagiannopoulos, K.; Schwabe, P.; and Stoffelen, K.
IACR Cryptol. ePrint Arch.,173. 2018.
Paper
link
bibtex
@article{DBLP:journals/iacr/GregoirePSS18,
author = {Benjamin Gr{\'{e}}goire and
Kostas Papagiannopoulos and
Peter Schwabe and
Ko Stoffelen},
title = {Vectorizing Higher-Order Masking},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {173},
year = {2018},
url = {http://eprint.iacr.org/2018/173},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/GregoirePSS18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based Cryptography.
Khalid, A.; Howe, J.; Rafferty, C.; Regazzoni, F.; and O'Neill, M.
IACR Cryptol. ePrint Arch.,265. 2018.
Paper
link
bibtex
@article{DBLP:journals/iacr/KhalidHRRO18,
author = {Ayesha Khalid and
James Howe and
Ciara Rafferty and
Francesco Regazzoni and
M{\'{a}}ire O'Neill},
title = {Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based
Cryptography},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {265},
year = {2018},
url = {http://eprint.iacr.org/2018/265},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/KhalidHRRO18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Rethinking Secure FPGAs: Towards a Cryptography-friendly Configurable Cell Architecture and its Automated Design Flow.
Mentens, N.; Charbon, E.; and Regazzoni, F.
IACR Cryptol. ePrint Arch.,724. 2018.
Paper
link
bibtex
@article{DBLP:journals/iacr/MentensCR18,
author = {Nele Mentens and
Edoardo Charbon and
Francesco Regazzoni},
title = {Rethinking Secure FPGAs: Towards a Cryptography-friendly Configurable
Cell Architecture and its Automated Design Flow},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {724},
year = {2018},
url = {https://eprint.iacr.org/2018/724},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/MentensCR18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis.
Picek, S.; Heuser, A.; Alippi, C.; and Regazzoni, F.
IACR Cryptol. ePrint Arch.,1123. 2018.
Paper
link
bibtex
@article{DBLP:journals/iacr/PicekHAR18,
author = {Stjepan Picek and
Annelie Heuser and
Cesare Alippi and
Francesco Regazzoni},
title = {When Theory Meets Practice: {A} Framework for Robust Profiled Side-channel
Analysis},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {1123},
year = {2018},
url = {https://eprint.iacr.org/2018/1123},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/PicekHAR18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations.
Picek, S.; Heuser, A.; Jovic, A.; Bhasin, S.; and Regazzoni, F.
IACR Cryptol. ePrint Arch.,476. 2018.
Paper
link
bibtex
@article{DBLP:journals/iacr/PicekHJBR18,
author = {Stjepan Picek and
Annelie Heuser and
Alan Jovic and
Shivam Bhasin and
Francesco Regazzoni},
title = {The Curse of Class Imbalance and Conflicting Metrics with Machine
Learning for Side-channel Evaluations},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {476},
year = {2018},
url = {https://eprint.iacr.org/2018/476},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/PicekHJBR18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Towards Lightweight Cryptographic Primitives with Built-in Fault-Detection.
Simon, T.; Batina, L.; Daemen, J.; Grosso, V.; Massolino, P. M. C.; Papagiannopoulos, K.; Regazzoni, F.; and Samwel, N.
IACR Cryptol. ePrint Arch.,729. 2018.
Paper
link
bibtex
@article{DBLP:journals/iacr/SimonBDGMPRS18,
author = {Thierry Simon and
Lejla Batina and
Joan Daemen and
Vincent Grosso and
Pedro Maat Costa Massolino and
Kostas Papagiannopoulos and
Francesco Regazzoni and
Niels Samwel},
title = {Towards Lightweight Cryptographic Primitives with Built-in Fault-Detection},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {729},
year = {2018},
url = {https://eprint.iacr.org/2018/729},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/SimonBDGMPRS18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Boolean Exponent Splitting.
Tunstall, M.; Papachristodoulou, L.; and Papagiannopoulos, K.
IACR Cryptol. ePrint Arch.,1226. 2018.
Paper
link
bibtex
@article{DBLP:journals/iacr/TunstallPP18,
author = {Michael Tunstall and
Louiza Papachristodoulou and
Kostas Papagiannopoulos},
title = {Boolean Exponent Splitting},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {1226},
year = {2018},
url = {https://eprint.iacr.org/2018/1226},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/TunstallPP18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}