|
|
PROOFS 2021: Author Index| Author | Papers |
|---|
| A | | Asano, Tamon | Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor | | B | | Boespflug, Etienne | Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities | | Bu, Lei | Locality Based Cache Side-channel Attack Detection | | C | | Cheng, Wei | Towards Finding Best Linear Codes for Side-Channel Protections | | F | | Féliot, David | Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities | | G | | Guilley, Sylvain | Towards Finding Best Linear Codes for Side-Channel Protections | | L | | Lacombe, Guilhem | Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities | | Liu, Yi | Towards Finding Best Linear Codes for Side-Channel Protections | | M | | Marzougui, Soundes | XMSS-based Chain of Trust | | O | | Ou, Changhai | Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations | | P | | Potet, Marie-Laure | Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities | | Q | | Qiao, Kexin | Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations | | R | | Rioul, Olivier | Towards Finding Best Linear Codes for Side-Channel Protections | | S | | Seifert, Jean-Pierre | XMSS-based Chain of Trust | | Song, Fu | Locality Based Cache Side-channel Attack Detection | | Sugawara, Takeshi | Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor | | W | | Wang, Limin | Locality Based Cache Side-channel Attack Detection | | Z | | Zhang, Fan | Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations | | Zhang, Renjun | Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations | | Zhou, Xinping | Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations |
|
|
|