Search

Your search keyword '"EMbedded SEcurity and Cryptography (EMSEC)"' showing total 135 results

Search Constraints

Start Over You searched for: Author "EMbedded SEcurity and Cryptography (EMSEC)" Remove constraint Author: "EMbedded SEcurity and Cryptography (EMSEC)"
135 results on '"EMbedded SEcurity and Cryptography (EMSEC)"'

Search Results

1. Improved Side-Channel Analysis of Finite-Field Multiplication

2. Cracking the Stateful Nut: Computational Proofs of Stateful Security Protocols using the Squirrel Proof Assistant

3. Beyond 2014

4. An Interactive Prover for Protocol Verification in the Computational Model

5. How to (Legally) Keep Secrets from Mobile Operators

6. SKINNY with Scalpel Comparing Tools for Differential Analysis

7. Catching the Fastest Boomerangs

8. Automatic generation of sources lemmas in Tamarin: towards automatic proofs of security protocols

9. Designing Reverse Firewalls for the Real World

10. A Method for Proving Unlinkability of Stateful Protocols

11. A decidable class of security protocols for both reachability and equivalence properties

12. Solving ECDLP over F p with Pre-computation via Representation Technique

13. Typing messages for free in security protocols

14. Cryptanalysis of SKINNY in the Framework of the SKINNY 2018–2019 Cryptanalysis Competition

15. Combining sources of side-channel information

16. Optimisation des principaux composants des chiffrements par bloc

17. Lossy trapdoor primitives, zero-knowledge proofs and applications

18. Lossy trapdoor primitives, zero-knowledge proofs and applications

19. MaskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults

20. IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography

21. Automated Verification of Higher-Order Masking in Presence of Physical Defaults

22. Symbolic Analysis of Terrorist Fraud Resistance

23. Volume of representations and mapping degree

24. Efficient Attack-Defense Tree Analysis using Pareto Attribute Domains

25. Attack Trees: A Notion of Missing Attacks

26. Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting

27. Lossy Algebraic Filters With Short Tags

28. Symbolic Verification of Distance Bounding Protocols

29. 5th International Workshop on Graphical Models for Security, held in conjunction with the Federated Logic Conference (FLoC) 2018, GraMSec@FLoC 2018, Oxford, UK, July 8, 2018, Revised Selected Papers

30. Security of Distance-Bounding: A Survey

31. Side-Channel Analysis of Post-Quantum Cryptography

32. GALACTICS - Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited

33. Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks

34. Attack–Defense Trees for Abusing Optical Power Meters: A Case Study and the OSEAD Tool Experience Report

35. SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting

36. The privacy of the TLS 1.3 protocol

37. Pattern Matching on Encrypted Streams

38. LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS

39. Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints

40. Linear algebra algorithms for cryptography

41. Algorithmes d'algèbre linéaire pour la cryptographie

42. PLAS 2018 - ACM SIGSAC Workshop on Programming Languages and Analysis for Security

43. Backdoors: Definition, Deniability and Detection

44. From Identification Using Rejection Sampling to Signatures via the Fiat-Shamir Transform: Application to the BLISS Signature

45. Are your data gathered? The Folding Test of Unimodality

46. Variants of the AES Key Schedule for Better Truncated Differential Bounds

47. POR for Security Protocol Equivalences: Beyond Action-Determinism

48. Formal Security Proof of CMAC and Its Variants

49. Guided Design of Attack Trees: A System-Based Approach

50. Décision efficace de l'équivalence de protocoles pour les primitives classiques et les phases

Catalog

Books, media, physical & digital resources