PROOFS 2021:Keyword Index

KeywordPapers
B
Bit-interaction leakageSimulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
bootloader use-caseCombining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities
C
Chain of TrustXMSS-based Chain of Trust
Code-based Masking SchemeTowards Finding Best Linear Codes for Side-Channel Protections
D
Detection based defensesLocality Based Cache Side-channel Attack Detection
DilithiumXMSS-based Chain of Trust
F
fault injection robustnessCombining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities
FLSSMultiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
H
handshake protocolXMSS-based Chain of Trust
high-level informationLocality Based Cache Side-channel Attack Detection
I
Information-Theoretic MetricTowards Finding Best Linear Codes for Side-Channel Protections
L
linear codeTowards Finding Best Linear Codes for Side-Channel Protections
localityLocality Based Cache Side-channel Attack Detection
M
MaskingSimulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
multiple-layer sieveMultiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
P
post-quantum cryptographyXMSS-based Chain of Trust
R
RISC-VSimulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
S
serial implementationMultiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
Share-slicingSimulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
Side Channel AttackSimulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
side-channel analysisTowards Finding Best Linear Codes for Side-Channel Protections
side-channel attacksLocality Based Cache Side-channel Attack Detection
simulationSimulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
SMLSMultiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
source code static analysisCombining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities
stacking attackMultiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
symbolic executionCombining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities
T
TLSsMultiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
W
weight distributionTowards Finding Best Linear Codes for Side-Channel Protections
X
XMSSXMSS-based Chain of Trust