Search:

Start a new search
Add/Remove Filters (2 filters currently applied)

Results 1-8 of 8 (Search time: 0.077 seconds).
 |  Relevance

 

  • previous
  • 1
  • next
Item hits:
Issue DateTitleAuthor(s)
1 2014Assets dependencies model in information security risk managementJakub, Breier; Frank, Schindler
22015Laser Profiling for the Back-Side Fault Attacks: With a Practical Laser Skip Instruction Attack on AESBreier, Jakub; Jap, Dirmanto; Chen, Chien-Ning
32016Supervised and unsupervised machine learning for side-channel based Trojan detectionJap, Dirmanto; Bhasin, Shivam; He, Wei
42012Enabling 3-share threshold implementations for all 4-bit S-boxesKutzner, Sebastian; Nguyen, Phuong Ha; Poschmann, Axel
52013Coherent polarization locking of Q-switched Ho:YAG laserChua, C. F.; Tan, L. H.; Phua, Poh Boon.
62018Protecting block ciphers against differential fault attacks without re-keyingBaksi, Anubhab; Bhasin, Shivam; Breier, Jakub; Khairallah, Mustafa; Peyrin, Thomas
72015Testing Feasibility of Back-Side Laser Fault Injection on a MicrocontrollerBreier, Jakub; Jap, Dirmanto
82013TROJANUS : An ultra-lightweight side-channel leakage generator for FPGAsKutzner, Sebastian; Poschmann, Axel; Stöttinger, Marc