-
1دورية أكاديمية
المؤلفون: Estuardo Alpirez Bock, Chris Brzuska, Russell W. F. Lai
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 4 (2023)
مصطلحات موضوعية: White-Box Cryptography, Incompressibility, Bounded-Retrieval, Leakage Resilience, Impossibility, Provable Security, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
2دورية أكاديمية
المؤلفون: Estuardo Alpirez Bock, Alessandro Amadori, Chris Brzuska, Wil Michiels
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 2 (2020)
مصطلحات موضوعية: White-box cryptography, Hardware-binding, Application-binding, Security Notions, Feasibility, AES, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
3
المصدر: Security, Privacy, and Applied Cryptography Engineering ISBN: 9783031228285
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::86f4fc0fcc54753b690b407178af5290
https://doi.org/10.1007/978-3-031-22829-2_7 -
4
المؤلفون: Estuardo Alpirez Bock, Alexander Treff
المصدر: Constructive Side-Channel Analysis and Secure Design ISBN: 9783030687724
COSADEمصطلحات موضوعية: Reverse engineering, Differential fault analysis, Computer science, business.industry, 020206 networking & telecommunications, Cryptography, 02 engineering and technology, Security assessment, computer.software_genre, Computer security, Qualitative analysis, Robustness (computer science), 0202 electrical engineering, electronic engineering, information engineering, Key (cryptography), 020201 artificial intelligence & image processing, White box, business, computer
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::2880758513726d0422e88d2d69f78d05
https://doi.org/10.1007/978-3-030-68773-1_7 -
5
المؤلفون: Wil Michiels, Alessandro Amadori, Estuardo Alpirez Bock, Chris Brzuska
المساهمون: Professorship Brzuska Chris, Technische Universiteit Eindhoven, NXP Semiconductors, Department of Mathematics and Systems Analysis, Department of Computer Science, Aalto-yliopisto, Aalto University
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 2 (2020)
مصطلحات موضوعية: AES, lcsh:Computer engineering. Computer hardware, lcsh:T58.5-58.64, Computer science, lcsh:Information technology, Feasibility, lcsh:TK7885-7895, Hardware-binding, Computer security, computer.software_genre, Security Notions, White-box cryptography, White box cryptography, Application-binding, computer
وصف الملف: application/pdf
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9866e509648449e2c3fa12315c95c6fe
https://aaltodoc.aalto.fi/handle/123456789/102202 -
6
المصدر: Advances in Cryptology – ASIACRYPT 2020 ISBN: 9783030648367
ASIACRYPT (1)مصطلحات موضوعية: business.operation, Computer science, business.industry, media_common.quotation_subject, Cryptography, Certification, Computer security, computer.software_genre, Payment, MasterCard, Mobile payment, Key derivation function, White box, business, computer, Implementation, media_common
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::f097a654fb816618cbbc6330fa62573f
https://doi.org/10.1007/978-3-030-64837-4_8 -
7
المؤلفون: Joppe W. Bos, Eloi Sanfelix Gonzalez, Cristofaro Mune, Charles Hubain, Estuardo Alpirez Bock, Alexander Treff, Chris Brzuska, Wil Michiels, Philippe Teuwen
المساهمون: Security
المصدر: Journal of Cryptology, 32(4), 1095-1143. Springer
مصطلحات موضوعية: Software execution traces, Computer science, Differential computation analysis, Cryptography, 0102 computer and information sciences, Computer security, computer.software_genre, Encryption, 01 natural sciences, 03 medical and health sciences, 0302 clinical medicine, Instrumentation (computer programming), Cryptographic primitive, Differential fault analysis, business.industry, Applied Mathematics, Fault injection, Computer Science Applications, White-box cryptography, Power analysis, Differential power analysis, 010201 computation theory & mathematics, 030220 oncology & carcinogenesis, Embedded system, Key (cryptography), business, computer, Software
-
8
المؤلفون: Wil Michiels, Estuardo Alpirez Bock, Alexander Treff, Chris Brzuska
المساهمون: Security
المصدر: Applied Cryptography and Network Security-16th International Conference, ACNS 2018, Proceedings, 103-120
STARTPAGE=103;ENDPAGE=120;TITLE=Applied Cryptography and Network Security-16th International Conference, ACNS 2018, Proceedings
Applied Cryptography and Network Security ISBN: 9783319933863
ACNSمصطلحات موضوعية: Software execution traces, Theoretical computer science, Mixing bijections, Computer science, business.industry, Process (computing), Cryptography, 02 engineering and technology, Encryption, Nibble, Differential computational analysis, 020202 computer hardware & architecture, White-box cryptography, Memory address, Software, 0202 electrical engineering, electronic engineering, information engineering, Key (cryptography), 020201 artificial intelligence & image processing, Instrumentation (computer programming), business
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7f7c444fd01f2cd9522eea5721ce1f7a
https://research.tue.nl/nl/publications/ddf35f29-d858-4dcc-a76d-9082425f5163 -
9
المؤلفون: Peter Langendoerfer, Estuardo Alpirez Bock, Ievgen Kabin, Zoya Dyka
المصدر: NTMS
مصطلحات موضوعية: Homogeneous coordinates, Computer science, 02 engineering and technology, Parallel computing, 020202 computer hardware & architecture, Elliptic curve, Elliptic curve point multiplication, Power analysis, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Algorithm design, Side channel attack, Elliptic curve cryptography, Algorithm, Efficient energy use
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::08985090001f28f06c148321920c5135
https://doi.org/10.1109/ntms.2016.7792457 -
10Increasing the Robustness of the Montgomery kP-Algorithm Against SCA by Modifying Its Initialization
المؤلفون: Estuardo Alpirez Bock, Peter Langendoerfer, Zoya Dyka
المصدر: Lecture Notes in Computer Science
Lecture Notes in Computer Science-Innovative Security Solutions for Information Technology and Communications
Innovative Security Solutions for Information Technology and Communications ISBN: 9783319472379
SECITC
Innovative Security Solutions for Information Technology and Communicationsمصطلحات موضوعية: Homogeneous coordinates, Computer science, 020208 electrical & electronic engineering, Initialization, 02 engineering and technology, Scalar multiplication, 020202 computer hardware & architecture, Elliptic curve, Power analysis, Robustness (computer science), 0202 electrical engineering, electronic engineering, information engineering, Side channel attack, Elliptic curve cryptography, Algorithm
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b081f9c062ae0a53b66c7070c0e94bcd