a |
ARMv8 | Compositional Verification of Security Properties for Embedded Execution Platforms |
asymmetric leakage | Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands |
b |
block cipher | An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach |
c |
countermeasure | Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands |
d |
Data Mining | An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach |
decomposition | Compositional Verification of Security Properties for Embedded Execution Platforms |
Differential Fault Attack | An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach |
e |
ECC | Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands |
f |
field multiplications | Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands |
formal evaluation | Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes |
formal verification | Compositional Verification of Security Properties for Embedded Execution Platforms |
h |
hardware platform | Compositional Verification of Security Properties for Embedded Execution Platforms |
HCCA | Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands |
Hypervisor | Compositional Verification of Security Properties for Embedded Execution Platforms |
m |
machine learning | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs |
Masking | Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes |
p |
PAC learning | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs |
Physical Unclonable Functions | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs |
s |
security analysis | Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs |
side-channel attacks | Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes |
SoC | Compositional Verification of Security Properties for Embedded Execution Platforms |
System Security | Compositional Verification of Security Properties for Embedded Execution Platforms |