-
3
-
-
78049343750
-
SCIP-solving constraint integer programs
-
Berthold, T., Heinz, S., Pfetsch, M. E., Winkler, M.: SCIP-solving constraint integer programs. In: SAT 2009 competitive events booklet (2009)
-
(2009)
SAT 2009 Competitive Events Booklet
-
-
Berthold, T.1
Heinz, S.2
Pfetsch, M.E.3
Winkler, M.4
-
4
-
-
70350650936
-
Nonlinear pseudo-boolean optimization: Relaxation or propagation?
-
Kullmann, O. ed, Springer, Heidelberg
-
Berthold, T., Heinz, S., Pfetsch, M. E.: Nonlinear pseudo-boolean optimization: Relaxation or propagation? In: Kullmann, O. (ed.) SAT 2009. LNCS, vol. 5584, pp. 441-446. Springer, Heidelberg (2009)
-
(2009)
SAT 2009. LNCS
, vol.5584
, pp. 441-446
-
-
Berthold, T.1
Heinz, S.2
Pfetsch, M.E.3
-
6
-
-
27244440344
-
A very compact S-box for AES
-
Rao, J. R., Sunar, B. eds., Springer, Heidelberg
-
Canright, D.: A very compact S-Box for AES. In: Rao, J. R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 441-455. Springer, Heidelberg (2005)
-
(2005)
CHES 2005. LNCS
, vol.3659
, pp. 441-455
-
-
Canright, D.1
-
7
-
-
50249137714
-
Algebraic and slide attacks on KeeLoq
-
Nyberg, K. ed, Springer, Heidelberg
-
Courtois, N., Bard, G. V., Wagner, D.: Algebraic and slide attacks on KeeLoq. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 97-115. Springer, Heidelberg (2008)
-
(2008)
FSE 2008. LNCS
, vol.5086
, pp. 97-115
-
-
Courtois, N.1
Bard, G.V.2
Wagner, D.3
-
10
-
-
51849131973
-
On the power of power analysis in the real world: A complete break of the Keeloq code hopping scheme
-
Wagner, D. ed, Springer, Heidelberg
-
Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Manzuri Shalmani, M. T.: On the power of power analysis in the real world: A complete break of the Keeloq code hopping scheme. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 203-220. Springer, Heidelberg (2008)
-
(2008)
CRYPTO 2008. LNCS
, vol.5157
, pp. 203-220
-
-
Eisenbarth, T.1
Kasper, T.2
Moradi, A.3
Paar, C.4
Salmasizadeh, M.5
Shalmani, M.M.T.6
-
11
-
-
35248868313
-
Hidden Markov model cryptoanalysis
-
Walter, C. D., Koç, Ç. K., Paar, C. eds., Springer, Heidelberg
-
Karlof, C., Wagner, D.: Hidden Markov model cryptoanalysis. In: Walter, C. D., Koç, Ç. K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 17-34. Springer, Heidelberg (2003)
-
(2003)
CHES 2003. LNCS
, vol.2779
, pp. 17-34
-
-
Karlof, C.1
Wagner, D.2
-
12
-
-
84939573910
-
Differential power analysis
-
Wiener, M. ed, Springer, Heidelberg
-
Kocher, P. C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
CRYPTO 1999. LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
13
-
-
35248892041
-
A simple power-analysis (SPA) attack on implementations of the AES key expansion
-
Lee, P. J., Lim, C. H. eds., Springer, Heidelberg
-
Mangard, S.: A simple power-analysis (SPA) attack on implementations of the AES key expansion. In: Lee, P. J., Lim, C. H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 343-358. Springer, Heidelberg (2003)
-
(2003)
ICISC 2002. LNCS
, vol.2587
, pp. 343-358
-
-
Mangard, S.1
-
14
-
-
84890863577
-
-
Springer, New York
-
Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security). Springer, New York (2007)
-
(2007)
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)
-
-
Mangard, S.1
Oswald, E.2
Popp, T.3
-
16
-
-
0034140491
-
Logical cryptanalysis as a SAT problem
-
Massacci, F., Marraro, L.: Logical cryptanalysis as a SAT problem. J. Autom. Reason. 24 (1-2), 165-203 (2000)
-
(2000)
J. Autom. Reason
, vol.24
, Issue.1-2
, pp. 165-203
-
-
Massacci, F.1
Marraro, L.2
-
17
-
-
34247563970
-
Aiding sidechannel attacks on cryptographic software with satisfiability-based analysis
-
Potlapally, N. R., Raghunathan, A., Ravi, S., Jha, N. K., Lee, R. B.: Aiding sidechannel attacks on cryptographic software with satisfiability-based analysis. IEEE Trans. on VLSI Systems 15(4), 465-470 (2007)
-
(2007)
IEEE Trans. on VLSI Systems
, vol.15
, Issue.4
, pp. 465-470
-
-
Potlapally, N.R.1
Raghunathan, A.2
Ravi, S.3
Jha, N.K.4
Lee, R.B.5
-
18
-
-
70350576829
-
Algebraic side-channel attacks on the AES: Why time also matters in DPA
-
Clavier, C., Gaj, K. eds., Springer, Heidelberg
-
Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N.: Algebraic side-channel attacks on the AES: Why time also matters in DPA. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 97-111. Springer, Heidelberg (2009)
-
(2009)
CHES 2009. LNCS
, vol.5747
, pp. 97-111
-
-
Renauld, M.1
Standaert, F.-X.2
Veyrat-Charvillon, N.3
-
20
-
-
84935113569
-
Error bounds for convolutional codes and an asymptotically optimum decoding algorithm
-
Viterbi, A.: Error bounds for convolutional codes and an asymptotically optimum decoding algorithm. IEEE Transactions on Information Theory 13(2), 260-269 (1967)
-
(1967)
IEEE Transactions on Information Theory
, vol.13
, Issue.2
, pp. 260-269
-
-
Viterbi, A.1
|