default search action
BibTeX records: Simon Hoerder
@inproceedings{DBLP:conf/cases/BanciuHP13, author = {Valentina Banciu and Simon Hoerder and Dan Page}, title = {Light-weight primitive, feather-weight security: a cryptanalytic knock-out}, booktitle = {Proceedings of the Workshop on Embedded Systems Security, {WESS} 2013, Montreal, Quebec, Canada, September 29 - October 4, 2013}, pages = {3:1--3:10}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2527317.2527320}, doi = {10.1145/2527317.2527320}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cases/BanciuHP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/HoerderJP13, author = {Simon Hoerder and Kimmo J{\"{a}}rvinen and Daniel Page}, editor = {Lorenzo Cavallaro and Dieter Gollmann}, title = {On Secure Embedded Token Design}, booktitle = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013, Heraklion, Greece, May 28-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7886}, pages = {112--128}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38530-8\_8}, doi = {10.1007/978-3-642-38530-8\_8}, timestamp = {Sat, 09 Apr 2022 12:44:35 +0200}, biburl = {https://dblp.org/rec/conf/wistp/HoerderJP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoerderJP13, author = {Simon Hoerder and Kimmo J{\"{a}}rvinen and Dan Page}, title = {On secure embedded token design (Long Version) - Quasi-looped Yao circuits and bounded leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {168}, year = {2013}, url = {http://eprint.iacr.org/2013/168}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoerderJP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanciuHP13, author = {Valentina Banciu and Simon Hoerder and Dan Page}, title = {Light-weight primitive, feather-weight security? {A} cryptanalytic knock-out. (Preliminary results)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {421}, year = {2013}, url = {http://eprint.iacr.org/2013/421}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanciuHP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GrabherGHJPTW12, author = {Philipp Grabher and Johann Gro{\ss}sch{\"{a}}dl and Simon Hoerder and Kimmo J{\"{a}}rvinen and Daniel Page and Stefan Tillich and Marcin W{\'{o}}jcik}, title = {An exploration of mechanisms for dynamic cryptographic instruction set extension}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {1}, pages = {1--18}, year = {2012}, url = {https://doi.org/10.1007/s13389-011-0025-8}, doi = {10.1007/S13389-011-0025-8}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/GrabherGHJPTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AvanziHPT12, author = {Roberto Avanzi and Simon Hoerder and Dan Page and Michael Tunstall}, title = {Erratum to: Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {1}, pages = {75}, year = {2012}, url = {https://doi.org/10.1007/s13389-011-0026-7}, doi = {10.1007/S13389-011-0026-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/AvanziHPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AvanziHPT11, author = {Roberto Avanzi and Simon Hoerder and Dan Page and Michael Tunstall}, title = {Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {4}, pages = {271--281}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0024-9}, doi = {10.1007/S13389-011-0024-9}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/AvanziHPT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GrabherGHJPTW11, author = {Philipp Grabher and Johann Gro{\ss}sch{\"{a}}dl and Simon Hoerder and Kimmo J{\"{a}}rvinen and Dan Page and Stefan Tillich and Marcin W{\'{o}}jcik}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {An Exploration of Mechanisms for Dynamic Cryptographic Instruction Set Extension}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {1--16}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_1}, doi = {10.1007/978-3-642-23951-9\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GrabherGHJPTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/HoerderWTP11, author = {Simon Hoerder and Marcin W{\'{o}}jcik and Stefan Tillich and Daniel Page}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {160--174}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_11}, doi = {10.1007/978-3-642-21040-2\_11}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/wistp/HoerderWTP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AvanziHPT10, author = {Roberto Maria Avanzi and Simon Hoerder and Daniel Page and Michael Tunstall}, title = {Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {479}, year = {2010}, url = {http://eprint.iacr.org/2010/479}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AvanziHPT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoerderWTP10, author = {Simon Hoerder and Marcin W{\'{o}}jcik and Stefan Tillich and Dan Page}, title = {An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {614}, year = {2010}, url = {http://eprint.iacr.org/2010/614}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoerderWTP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.