A |

ARMv8 | Compositional Verification of Security Properties for Embedded Execution Platforms |

asymmetric leakage | Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands |

B |

block cipher | An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach |

C |

countermeasure | Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands |

D |

Data Mining | An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach |

decomposition | Compositional Verification of Security Properties for Embedded Execution Platforms |

Differential Fault Attack | An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach |

E |

ECC | Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands |

F |

field multiplications | Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands |

formal evaluation | Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes |

formal verification | Compositional Verification of Security Properties for Embedded Execution Platforms |

H |

hardware platform | Compositional Verification of Security Properties for Embedded Execution Platforms |

HCCA | Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands |

Hypervisor | Compositional Verification of Security Properties for Embedded Execution Platforms |

M |

machine learning | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs |

Masking | Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes |

P |

PAC learning | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs |

Physical Unclonable Functions | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs |

S |

security analysis | Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs |

side-channel attacks | Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes |

SoC | Compositional Verification of Security Properties for Embedded Execution Platforms |

System Security | Compositional Verification of Security Properties for Embedded Execution Platforms |