Home
EPiC Series
Kalpa Publications
Preprints
For Authors
For Editors
Volume
•
Abstracts
•
Preface
•
Authors
•
Keywords
•
BibTex Entries
PROOFS 2021
:
Keyword Index
Keyword
Papers
B
Bit-interaction leakage
Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
bootloader use-case
Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities
C
Chain of Trust
XMSS-based Chain of Trust
Code-based Masking Scheme
Towards Finding Best Linear Codes for Side-Channel Protections
D
Detection based defenses
Locality Based Cache Side-channel Attack Detection
Dilithium
XMSS-based Chain of Trust
F
fault injection robustness
Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities
FLSS
Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
H
handshake protocol
XMSS-based Chain of Trust
high-level information
Locality Based Cache Side-channel Attack Detection
I
Information-Theoretic Metric
Towards Finding Best Linear Codes for Side-Channel Protections
L
linear code
Towards Finding Best Linear Codes for Side-Channel Protections
locality
Locality Based Cache Side-channel Attack Detection
M
Masking
Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
multiple-layer sieve
Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
P
post-quantum cryptography
XMSS-based Chain of Trust
R
RISC-V
Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
S
serial implementation
Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
Share-slicing
Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
Side Channel Attack
Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
side-channel analysis
Towards Finding Best Linear Codes for Side-Channel Protections
side-channel attacks
Locality Based Cache Side-channel Attack Detection
simulation
Simulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
SMLS
Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
source code static analysis
Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities
stacking attack
Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
symbolic execution
Combining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities
T
TLSs
Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
W
weight distribution
Towards Finding Best Linear Codes for Side-Channel Protections
X
XMSS
XMSS-based Chain of Trust
Copyright © 2012-2023 easychair.org. All rights reserved.