BibTeX records: Thanh-Ha Le

download as .bib file

@article{DBLP:journals/mta/LeJW17,
  author    = {Thanh{-}Ha Le and
               Seung{-}Won Jung and
               Chee Sun Won},
  title     = {A new depth image quality metric using a pair of color and depth images},
  journal   = {Multimedia Tools Appl.},
  volume    = {76},
  number    = {9},
  pages     = {11285--11303},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11042-016-3392-4},
  doi       = {10.1007/s11042-016-3392-4},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/mta/LeJW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-09160,
  author    = {Srivatsa Prativadibhayankaram and
               Huynh Van Luong and
               Thanh{-}Ha Le and
               Andr{\'{e}} Kaup},
  title     = {Compressive Online Robust Principal Component Analysis with Optical
               Flow for Video Foreground-Background Separation},
  journal   = {CoRR},
  volume    = {abs/1710.09160},
  year      = {2017},
  url       = {http://arxiv.org/abs/1710.09160},
  archivePrefix = {arXiv},
  eprint    = {1710.09160},
  timestamp = {Thu, 02 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1710-09160},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/DureuilPPLCC16,
  author    = {Louis Dureuil and
               Guillaume Petiot and
               Marie{-}Laure Potet and
               Thanh{-}Ha Le and
               Aude Crohen and
               Philippe de Choudens},
  title     = {{FISSC:} {A} Fault Injection and Simulation Secure Collection},
  booktitle = {Computer Safety, Reliability, and Security - 35th International Conference,
               {SAFECOMP} 2016, Trondheim, Norway, September 21-23, 2016, Proceedings},
  pages     = {3--11},
  year      = {2016},
  crossref  = {DBLP:conf/safecomp/2016},
  url       = {https://doi.org/10.1007/978-3-319-45477-1_1},
  doi       = {10.1007/978-3-319-45477-1_1},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/safecomp/DureuilPPLCC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/RiviereBLC15,
  author    = {Lionel Rivi{\`{e}}re and
               Julien Bringer and
               Thanh{-}Ha Le and
               Herv{\'{e}} Chabanne},
  title     = {A novel simulation approach for fault injection resistance evaluation
               on smart cards},
  booktitle = {Eighth {IEEE} International Conference on Software Testing, Verification
               and Validation, {ICST} 2015 Workshops, Graz, Austria, April 13-17,
               2015},
  pages     = {1--8},
  year      = {2015},
  crossref  = {DBLP:conf/icst/2015w},
  url       = {https://doi.org/10.1109/ICSTW.2015.7107460},
  doi       = {10.1109/ICSTW.2015.7107460},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icst/RiviereBLC15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FujimotoMNHHAHKSLBBBD14,
  author    = {Daisuke Fujimoto and
               Noriyuki Miura and
               Makoto Nagata and
               Yu{-}ichi Hayashi and
               Naofumi Homma and
               Takafumi Aoki and
               Yohei Hori and
               Toshihiro Katashita and
               Kazuo Sakiyama and
               Thanh{-}Ha Le and
               Julien Bringer and
               Pirouz Bazargan{-}Sabet and
               Shivam Bhasin and
               Jean{-}Luc Danger},
  title     = {Power Noise Measurements of Cryptographic {VLSI} Circuits Regarding
               Side-Channel Information Leakage},
  journal   = {{IEICE} Transactions},
  volume    = {97-C},
  number    = {4},
  pages     = {272--279},
  year      = {2014},
  url       = {http://search.ieice.org/bin/summary.php?id=e97-c_4_272},
  timestamp = {Thu, 15 May 2014 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/FujimotoMNHHAHKSLBBBD14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/PuysRBL14,
  author    = {Maxime Puys and
               Lionel Rivi{\`{e}}re and
               Julien Bringer and
               Thanh{-}Ha Le},
  title     = {High-Level Simulation for Multiple Fault Injection Evaluation},
  booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security
               Assurance - 9th International Workshop, {DPM} 2014, 7th International
               Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014,
               Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers},
  pages     = {293--308},
  year      = {2014},
  crossref  = {DBLP:conf/esorics/2014-8872},
  url       = {https://doi.org/10.1007/978-3-319-17016-9_19},
  doi       = {10.1007/978-3-319-17016-9_19},
  timestamp = {Thu, 15 Jun 2017 21:35:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/PuysRBL14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/BerthierBCLRS14,
  author    = {Ma{\"{e}}l Berthier and
               Julien Bringer and
               Herv{\'{e}} Chabanne and
               Thanh{-}Ha Le and
               Lionel Rivi{\`{e}}re and
               Victor Servant},
  title     = {Idea: Embedded Fault Injection Simulator on Smartcard},
  booktitle = {Engineering Secure Software and Systems - 6th International Symposium,
               ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings},
  pages     = {222--229},
  year      = {2014},
  crossref  = {DBLP:conf/essos/2014},
  url       = {https://doi.org/10.1007/978-3-319-04897-0_15},
  doi       = {10.1007/978-3-319-04897-0_15},
  timestamp = {Wed, 17 May 2017 14:24:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/essos/BerthierBCLRS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/RivierePLBCP14,
  author    = {Lionel Rivi{\`{e}}re and
               Marie{-}Laure Potet and
               Thanh{-}Ha Le and
               Julien Bringer and
               Herv{\'{e}} Chabanne and
               Maxime Puys},
  title     = {Combining High-Level and Low-Level Approaches to Evaluate Software
               Implementations Robustness Against Multiple Fault Injection Attacks},
  booktitle = {Foundations and Practice of Security - 7th International Symposium,
               {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected
               Papers},
  pages     = {92--111},
  year      = {2014},
  crossref  = {DBLP:conf/fps/2014},
  url       = {https://doi.org/10.1007/978-3-319-17040-4_7},
  doi       = {10.1007/978-3-319-17040-4_7},
  timestamp = {Wed, 24 May 2017 08:29:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fps/RivierePLBCP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vlsi/ChusseauORJMTBVSLBRRR14,
  author    = {Laurent Chusseau and
               Rachid Omarouayache and
               Jeremy Raoult and
               Sylvie Jarrix and
               Philippe Maurine and
               Karim Tobich and
               Alexandre Boyer and
               Bertrand Vrignon and
               John Shepherd and
               Thanh{-}Ha Le and
               Ma{\"{e}}l Berthier and
               Lionel Rivi{\`{e}}re and
               Bruno Robisson and
               Anne{-}Lise Ribotta},
  title     = {Electromagnetic analysis, deciphering and reverse engineering of integrated
               circuits {(E-MATA} {HARI)}},
  booktitle = {22nd International Conference on Very Large Scale Integration, VLSI-SoC,
               Playa del Carmen, Mexico, October 6-8, 2014},
  pages     = {1--6},
  year      = {2014},
  crossref  = {DBLP:conf/vlsi/2014soc},
  url       = {https://doi.org/10.1109/VLSI-SoC.2014.7004189},
  doi       = {10.1109/VLSI-SoC.2014.7004189},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/vlsi/ChusseauORJMTBVSLBRRR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/LiEDHALDOS13,
  author    = {Yang Li and
               Sho Endo and
               Nicolas Debande and
               Naofumi Homma and
               Takafumi Aoki and
               Thanh{-}Ha Le and
               Jean{-}Luc Danger and
               Kazuo Ohta and
               Kazuo Sakiyama},
  title     = {Exploring the Relations between Fault Sensitivity and Power Consumption},
  booktitle = {Constructive Side-Channel Analysis and Secure Design - 4th International
               Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected
               Papers},
  pages     = {137--153},
  year      = {2013},
  crossref  = {DBLP:conf/cosade/2013},
  url       = {https://doi.org/10.1007/978-3-642-40026-1_9},
  doi       = {10.1007/978-3-642-40026-1_9},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cosade/LiEDHALDOS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDDLPA13,
  author    = {Guido Bertoni and
               Joan Daemen and
               Nicolas Debande and
               Thanh{-}Ha Le and
               Micha{\"{e}}l Peeters and
               Gilles Van Assche},
  title     = {Power Analysis of Hardware Implementations Protected with Secret Sharing},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {67},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/067},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BertoniDDLPA13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BringerCL12,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Thanh{-}Ha Le},
  title     = {Protecting {AES} against side-channel analysis using wire-tap codes},
  journal   = {J. Cryptographic Engineering},
  volume    = {2},
  number    = {2},
  pages     = {129--141},
  year      = {2012},
  url       = {https://doi.org/10.1007/s13389-012-0034-2},
  doi       = {10.1007/s13389-012-0034-2},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jce/BringerCL12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/BertoniDDLPA12,
  author    = {Guido Bertoni and
               Joan Daemen and
               Nicolas Debande and
               Thanh{-}Ha Le and
               Micha{\"{e}}l Peeters and
               Gilles Van Assche},
  title     = {Power analysis of hardware implementations protected with secret sharing},
  booktitle = {45th Annual {IEEE/ACM} International Symposium on Microarchitecture,
               {MICRO} 2012, Workshops Proceedings, Vancouver, BC, Canada, December
               1-5, 2012},
  pages     = {9--16},
  year      = {2012},
  crossref  = {DBLP:conf/micro/2012w},
  url       = {https://doi.org/10.1109/MICROW.2012.12},
  doi       = {10.1109/MICROW.2012.12},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/micro/BertoniDDLPA12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DebandeBBL12,
  author    = {Nicolas Debande and
               Ma{\"{e}}l Berthier and
               Yves Bocktaels and
               Thanh{-}Ha Le},
  title     = {Profiled Model Based Power Simulator for Side Channel Evaluation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {703},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/703},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DebandeBBL12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DebandeSNGLD11,
  author    = {Nicolas Debande and
               Youssef Souissi and
               Maxime Nassar and
               Sylvain Guilley and
               Thanh{-}Ha Le and
               Jean{-}Luc Danger},
  title     = {"Re-synchronization by moments": An efficient solution to
               align Side-Channel traces},
  booktitle = {2011 {IEEE} International Workshop on Information Forensics and Security,
               {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages     = {1--6},
  year      = {2011},
  crossref  = {DBLP:conf/wifs/2011},
  url       = {https://doi.org/10.1109/WIFS.2011.6123143},
  doi       = {10.1109/WIFS.2011.6123143},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wifs/DebandeSNGLD11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/LeB10,
  author    = {Thanh{-}Ha Le and
               Ma{\"{e}}l Berthier},
  title     = {Mutual Information Analysis under the View of Higher-Order Statistics},
  booktitle = {Advances in Information and Computer Security - 5th International
               Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
               Proceedings},
  pages     = {285--300},
  year      = {2010},
  crossref  = {DBLP:conf/iwsec/2010},
  url       = {https://doi.org/10.1007/978-3-642-16825-3_19},
  doi       = {10.1007/978-3-642-16825-3_19},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/LeB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LeCC08,
  author    = {Thanh{-}Ha Le and
               C{\'{e}}cile Canovas and
               Jessy Cl{\'{e}}di{\`{e}}re},
  title     = {An overview of side channel analysis attacks},
  booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
               2008},
  pages     = {33--43},
  year      = {2008},
  crossref  = {DBLP:conf/ccs/2008asia},
  url       = {http://doi.acm.org/10.1145/1368310.1368319},
  doi       = {10.1145/1368310.1368319},
  timestamp = {Tue, 21 Nov 2017 18:32:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/LeCC08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LeCSL07,
  author    = {Thanh{-}Ha Le and
               Jessy Cl{\'{e}}di{\`{e}}re and
               Christine Servi{\`{e}}re and
               Jean{-}Louis Lacoume},
  title     = {Noise Reduction in Side Channel Attack Using Fourth-Order Cumulant},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {2},
  number    = {4},
  pages     = {710--720},
  year      = {2007},
  url       = {https://doi.org/10.1109/TIFS.2007.910252},
  doi       = {10.1109/TIFS.2007.910252},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/LeCSL07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/LeCSL07,
  author    = {Thanh{-}Ha Le and
               Jessy Cl{\'{e}}di{\`{e}}re and
               Christine Servi{\`{e}}re and
               Jean{-}Louis Lacoume},
  title     = {Efficient Solution for Misalignment of Signal in Side Channel Analysis},
  booktitle = {Proceedings of the {IEEE} International Conference on Acoustics, Speech,
               and Signal Processing, {ICASSP} 2007, Honolulu, Hawaii, USA, April
               15-20, 2007},
  pages     = {257--260},
  year      = {2007},
  crossref  = {DBLP:conf/icassp/2007},
  url       = {https://doi.org/10.1109/ICASSP.2007.366221},
  doi       = {10.1109/ICASSP.2007.366221},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icassp/LeCSL07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeNCC07,
  author    = {Thanh{-}Ha Le and
               Quoc{-}Thinh Nguyen{-}Vuong and
               C{\'{e}}cile Canovas and
               Jessy Cl{\'{e}}di{\`{e}}re},
  title     = {Novel Approaches for Improving the Power Consumption Models in Correlation
               Analysis},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {306},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/306},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/LeNCC07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LeCCRSL06,
  author    = {Thanh{-}Ha Le and
               Jessy Cl{\'{e}}di{\`{e}}re and
               C{\'{e}}cile Canovas and
               Bruno Robisson and
               Christine Servi{\`{e}}re and
               Jean{-}Louis Lacoume},
  title     = {A Proposition for Correlation Power Analysis Enhancement},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
               Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  pages     = {174--186},
  year      = {2006},
  crossref  = {DBLP:conf/ches/2006},
  url       = {https://doi.org/10.1007/11894063_14},
  doi       = {10.1007/11894063_14},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ches/LeCCRSL06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/safecomp/2016,
  editor    = {Amund Skavhaug and
               J{\'{e}}r{\'{e}}mie Guiochet and
               Friedemann Bitsch},
  title     = {Computer Safety, Reliability, and Security - 35th International Conference,
               {SAFECOMP} 2016, Trondheim, Norway, September 21-23, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9922},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-45477-1},
  doi       = {10.1007/978-3-319-45477-1},
  isbn      = {978-3-319-45476-4},
  timestamp = {Fri, 26 May 2017 00:49:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/safecomp/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icst/2015w,
  title     = {Eighth {IEEE} International Conference on Software Testing, Verification
               and Validation, {ICST} 2015 Workshops, Graz, Austria, April 13-17,
               2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7100633},
  isbn      = {978-1-4799-1885-0},
  timestamp = {Fri, 05 Aug 2016 12:49:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icst/2015w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2014-8872,
  editor    = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               Jordi Herrera{-}Joancomart{\'{\i}} and
               Emil Lupu and
               Joachim Posegga and
               Alessandro Aldini and
               Fabio Martinelli and
               Neeraj Suri},
  title     = {Data Privacy Management, Autonomous Spontaneous Security, and Security
               Assurance - 9th International Workshop, {DPM} 2014, 7th International
               Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014,
               Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8872},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-17016-9},
  doi       = {10.1007/978-3-319-17016-9},
  isbn      = {978-3-319-17015-2},
  timestamp = {Thu, 15 Jun 2017 21:35:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2014-8872},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/essos/2014,
  editor    = {Jan J{\"{u}}rjens and
               Frank Piessens and
               Nataliia Bielova},
  title     = {Engineering Secure Software and Systems - 6th International Symposium,
               ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8364},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-04897-0},
  doi       = {10.1007/978-3-319-04897-0},
  isbn      = {978-3-319-04896-3},
  timestamp = {Wed, 17 May 2017 14:24:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/essos/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fps/2014,
  editor    = {Fr{\'{e}}d{\'{e}}ric Cuppens and
               Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               A. Nur Zincir{-}Heywood and
               Philip W. L. Fong},
  title     = {Foundations and Practice of Security - 7th International Symposium,
               {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8930},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-17040-4},
  doi       = {10.1007/978-3-319-17040-4},
  isbn      = {978-3-319-17039-8},
  timestamp = {Wed, 24 May 2017 08:29:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fps/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vlsi/2014soc,
  editor    = {Lorena Garcia},
  title     = {22nd International Conference on Very Large Scale Integration, VLSI-SoC,
               Playa del Carmen, Mexico, October 6-8, 2014},
  publisher = {{IEEE}},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6996506},
  isbn      = {978-1-4799-6016-3},
  timestamp = {Tue, 13 Jan 2015 11:23:50 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/vlsi/2014soc},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cosade/2013,
  editor    = {Emmanuel Prouff},
  title     = {Constructive Side-Channel Analysis and Secure Design - 4th International
               Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7864},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40026-1},
  doi       = {10.1007/978-3-642-40026-1},
  isbn      = {978-3-642-40025-4},
  timestamp = {Sun, 21 May 2017 00:20:24 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cosade/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/micro/2012w,
  title     = {45th Annual {IEEE/ACM} International Symposium on Microarchitecture,
               {MICRO} 2012, Workshops Proceedings, Vancouver, BC, Canada, December
               1-5, 2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6472448},
  isbn      = {978-1-4673-4920-8},
  timestamp = {Fri, 31 May 2013 15:30:19 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/micro/2012w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2011,
  title     = {2011 {IEEE} International Workshop on Information Forensics and Security,
               {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  publisher = {{IEEE}},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6112284},
  isbn      = {978-1-4577-1017-9},
  timestamp = {Thu, 24 Jan 2013 09:46:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wifs/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2010,
  editor    = {Isao Echizen and
               Noboru Kunihiro and
               Ry{\^{o}}ichi Sasaki},
  title     = {Advances in Information and Computer Security - 5th International
               Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6434},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-16825-3},
  doi       = {10.1007/978-3-642-16825-3},
  isbn      = {978-3-642-16824-6},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008asia,
  editor    = {Masayuki Abe and
               Virgil D. Gligor},
  title     = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
               2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-59593-979-1},
  timestamp = {Tue, 21 Nov 2017 18:32:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2008asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icassp/2007,
  title     = {Proceedings of the {IEEE} International Conference on Acoustics, Speech,
               and Signal Processing, {ICASSP} 2007, Honolulu, Hawaii, USA, April
               15-20, 2007},
  publisher = {{IEEE}},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4216989},
  isbn      = {1-4244-0727-3},
  timestamp = {Wed, 09 Apr 2014 19:47:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icassp/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2006,
  editor    = {Louis Goubin and
               Mitsuru Matsui},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
               Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4249},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11894063},
  doi       = {10.1007/11894063},
  isbn      = {3-540-46559-6},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ches/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier