Validating the DFA Attack Resistance of AES (Short Paper)

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:FPS (12. : 2019 : Toulouse) Foundations and practice of security
1. Verfasser: Sugimoto, Hakuei (VerfasserIn)
Weitere Verfasser: Hatano, Ryota (VerfasserIn), Shoji, Natsu (VerfasserIn), Sakiyama, Kazuo (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Selection and Performance Analysis of CICIDS2017 Features Importance 2020 Reis, Bruno
Labelled Network Capture Generation for Anomaly Detection for a Customized, Secure, and 2020 Nogues, Maël
Incorporating Off-Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control 2020 Servos, Daniel
Dynamic Searchable Encryption with Access Control 2020 Blömer, Johannes
Validating the DFA Attack Resistance of AES (Short Paper) 2020 Sugimoto, Hakuei
A Privacy Protection Layer for Wearable Devices 2020 Mohzary, Muhammad
Command dependencies in heuristic safety analysis of access control models 2020 Amthor, Peter
Semantic Representation Based on Deep Learning for Spam Detection 2020 Saidani, Nadjate
Lempel-Ziv Compression with Randomized Input-Output for Anti-compression Side-Channel Attacks Under HTTPS/TLS 2020 Yang, Meng
Enroll, and Authentication Will Follow: eID-Based Enrollment for a Customized, Secture, and Frictionless Authentication Experience 2020 Ranise, Silvio
TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE 2020 Preuveneers, Davy
On Attribute Retrieval in ABAC 2020 Morisset, Charles
Protecting Android Apps from Repackaging Using Native Code 2020 Tanner, Simon
Security Analysis of Auctionity: A Blockchain Based E-Auction 2020 Lafourcade, Pascal
Digital Forensics in Vessel Transportation Systems 2020 Cantelli-Forti, Alessandro
PAC: Privacy-Preserving Arrhythmia Classification with Neural Networks 2020 Mansouri, Mohamad
Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles 2020 Shirazi, Hossein
Ransomware Network Traffic Analysis for Pre-encryption Alert 2020 Moussaileb, Routa
Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis 2020 Briguglio, William
Get-your-ID: Decentralized Proof of Identity 2020 Lafourcade, Pascal
Alle Artikel auflisten