Folgen
Kostas Papagiannopoulos
Kostas Papagiannopoulos
Bestätigte E-Mail-Adresse bei science.ru.nl - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Confused by confusion: Systematic evaluation of DPA resistance of various s-boxes
S Picek, K Papagiannopoulos, B Ege, L Batina, D Jakobovic
International Conference on Cryptology in India, 374-390, 2014
632014
Mind the gap: Towards secure 1st-order masking in software
K Papagiannopoulos, N Veshchikov
Constructive Side-Channel Analysis and Secure Design: 8th International …, 2017
622017
Optimality and beyond: The case of 4× 4 S-boxes
S Picek, B Ege, K Papagiannopoulos, L Batina, D Jakobović
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
362014
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection
T Simon, L Batina, J Daemen, V Grosso, PMC Massolino, ...
Annual International Conference on the Theory and Applications of …, 2020
312020
Side-channel based intrusion detection for industrial control systems
P Van Aubel, K Papagiannopoulos, Ł Chmielewski, C Doerr
Critical Information Infrastructures Security: 12th International Conference …, 2018
262018
Instruction duplication: Leaky and not too fault-tolerant!
L Cojocar, K Papagiannopoulos, N Timmers
Smart Card Research and Advanced Applications: 16th International Conference …, 2018
212018
Vectorizing higher-order masking
B Grégoire, K Papagiannopoulos, P Schwabe, K Stoffelen
Constructive Side-Channel Analysis and Secure Design: 9th International …, 2018
212018
Bitsliced masking and ARM: friends or foes?
W de Groot, K Papagiannopoulos, A de La Piedra, E Schneider, L Batina
Lightweight Cryptography for Security and Privacy: 5th International …, 2017
202017
Practical evaluation of protected residue number system scalar multiplication
L Papachristodoulou, AP Fournaris, K Papagiannopoulos, L Batina
182019
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages
C Andrikos, L Batina, L Chmielewski, L Lerman, V Mavroudis, ...
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
162019
How old is your brain? Slow-wave activity in non-rapid-eye-movement sleep as a marker of brain rejuvenation after long-term exercise in mice
M Panagiotou, K Papagiannopoulos, JHT Rohling, JH Meijer, T Deboer
Frontiers in Aging Neuroscience 10, 233, 2018
152018
Towards lightweight cryptographic primitives with built-in fault-detection
T Simon, L Batina, J Daemen, V Grosso, PMC Massolino, ...
Cryptology ePrint Archive, 2018
142018
Improving DPA resistance of S-boxes: How far can we go?
B Ege, K Papagiannopoulos, L Batina, S Picek
2015 IEEE International Symposium on Circuits and Systems (ISCAS), 2013-2016, 2015
122015
Blind side-channel SIFA
M Azouaoui, K Papagiannopoulos, D Zürner
2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 555-560, 2021
102021
The side-channel metrics cheat sheet
K Papagiannopoulos, O Glamočanin, M Azouaoui, D Ros, F Regazzoni, ...
ACM Computing Surveys 55 (10), 1-38, 2023
92023
Low randomness masking and shuffling: An evaluation using mutual information
K Papagiannopoulos
IACR Transactions on Cryptographic Hardware and Embedded Systems, 524-546, 2018
82018
Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?
M Azouaoui, O Bronchain, V Grosso, K Papagiannopoulos, FX Standaert
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022
72022
On the worst-case side-channel security of ECC point randomization in embedded devices
M Azouaoui, F Durvaux, R Poussier, FX Standaert, K Papagiannopoulos, ...
Progress in Cryptology–INDOCRYPT 2020: 21st International Conference on …, 2020
72020
Barıs Ege, Lejla Batina, and Domagoj Jakobovic. Confused by confusion: Systematic evaluation of dpa resistance of various s-boxes
S Picek, K Papagiannopoulos
International Conference on Cryptology in India, 374-390, 0
6
Boolean Exponent Splitting
M Tunstall, L Papachristodoulou, K Papagiannopoulos
Cryptology ePrint Archive, 2018
42018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20