BibTeX records: Simon Hoerder

download as .bib file

@inproceedings{DBLP:conf/cases/BanciuHP13,
  author       = {Valentina Banciu and
                  Simon Hoerder and
                  Dan Page},
  title        = {Light-weight primitive, feather-weight security: a cryptanalytic knock-out},
  booktitle    = {Proceedings of the Workshop on Embedded Systems Security, {WESS} 2013,
                  Montreal, Quebec, Canada, September 29 - October 4, 2013},
  pages        = {3:1--3:10},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2527317.2527320},
  doi          = {10.1145/2527317.2527320},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cases/BanciuHP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HoerderJP13,
  author       = {Simon Hoerder and
                  Kimmo J{\"{a}}rvinen and
                  Daniel Page},
  editor       = {Lorenzo Cavallaro and
                  Dieter Gollmann},
  title        = {On Secure Embedded Token Design},
  booktitle    = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical
                  Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013,
                  Heraklion, Greece, May 28-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7886},
  pages        = {112--128},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38530-8\_8},
  doi          = {10.1007/978-3-642-38530-8\_8},
  timestamp    = {Sat, 09 Apr 2022 12:44:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/HoerderJP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoerderJP13,
  author       = {Simon Hoerder and
                  Kimmo J{\"{a}}rvinen and
                  Dan Page},
  title        = {On secure embedded token design (Long Version) - Quasi-looped Yao
                  circuits and bounded leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {168},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/168},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoerderJP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanciuHP13,
  author       = {Valentina Banciu and
                  Simon Hoerder and
                  Dan Page},
  title        = {Light-weight primitive, feather-weight security? {A} cryptanalytic
                  knock-out. (Preliminary results)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {421},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/421},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanciuHP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GrabherGHJPTW12,
  author       = {Philipp Grabher and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Simon Hoerder and
                  Kimmo J{\"{a}}rvinen and
                  Daniel Page and
                  Stefan Tillich and
                  Marcin W{\'{o}}jcik},
  title        = {An exploration of mechanisms for dynamic cryptographic instruction
                  set extension},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {1},
  pages        = {1--18},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-011-0025-8},
  doi          = {10.1007/S13389-011-0025-8},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/GrabherGHJPTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AvanziHPT12,
  author       = {Roberto Avanzi and
                  Simon Hoerder and
                  Dan Page and
                  Michael Tunstall},
  title        = {Erratum to: Side-channel attacks on the McEliece and Niederreiter
                  public-key cryptosystems},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {1},
  pages        = {75},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-011-0026-7},
  doi          = {10.1007/S13389-011-0026-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/AvanziHPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AvanziHPT11,
  author       = {Roberto Avanzi and
                  Simon Hoerder and
                  Dan Page and
                  Michael Tunstall},
  title        = {Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {4},
  pages        = {271--281},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0024-9},
  doi          = {10.1007/S13389-011-0024-9},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/AvanziHPT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GrabherGHJPTW11,
  author       = {Philipp Grabher and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Simon Hoerder and
                  Kimmo J{\"{a}}rvinen and
                  Dan Page and
                  Stefan Tillich and
                  Marcin W{\'{o}}jcik},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {An Exploration of Mechanisms for Dynamic Cryptographic Instruction
                  Set Extension},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_1},
  doi          = {10.1007/978-3-642-23951-9\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GrabherGHJPTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HoerderWTP11,
  author       = {Simon Hoerder and
                  Marcin W{\'{o}}jcik and
                  Stefan Tillich and
                  Daniel Page},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {An Evaluation of Hash Functions on a Power Analysis Resistant Processor
                  Architecture},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {160--174},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_11},
  doi          = {10.1007/978-3-642-21040-2\_11},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/HoerderWTP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvanziHPT10,
  author       = {Roberto Maria Avanzi and
                  Simon Hoerder and
                  Daniel Page and
                  Michael Tunstall},
  title        = {Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {479},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/479},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AvanziHPT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoerderWTP10,
  author       = {Simon Hoerder and
                  Marcin W{\'{o}}jcik and
                  Stefan Tillich and
                  Dan Page},
  title        = {An Evaluation of Hash Functions on a Power Analysis Resistant Processor
                  Architecture},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {614},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/614},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoerderWTP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}