BibTeX records: Junko Takahashi

download as .bib file

@article{DBLP:journals/jce/NashimotoHHTFA17,
  author    = {Shoei Nashimoto and
               Naofumi Homma and
               Yu{-}ichi Hayashi and
               Junko Takahashi and
               Hitoshi Fuji and
               Takafumi Aoki},
  title     = {Buffer overflow attack with multiple fault injection and a proven
               countermeasure},
  journal   = {J. Cryptographic Engineering},
  volume    = {7},
  number    = {1},
  pages     = {35--46},
  year      = {2017},
  url       = {https://doi.org/10.1007/s13389-016-0136-3},
  doi       = {10.1007/s13389-016-0136-3},
  timestamp = {Wed, 26 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jce/NashimotoHHTFA17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/EndoHHTFA15,
  author    = {Sho Endo and
               Naofumi Homma and
               Yu{-}ichi Hayashi and
               Junko Takahashi and
               Hitoshi Fuji and
               Takafumi Aoki},
  title     = {An Adaptive Multiple-Fault Injection Attack on Microcontrollers and
               a Countermeasure},
  journal   = {{IEICE} Transactions},
  volume    = {98-A},
  number    = {1},
  pages     = {171--181},
  year      = {2015},
  url       = {http://search.ieice.org/bin/summary.php?id=e98-a_1_171},
  timestamp = {Tue, 19 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/EndoHHTFA15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/TakahashiFAF15,
  author    = {Junko Takahashi and
               Toshinori Fukunaga and
               Kazumaro Aoki and
               Hitoshi Fuji},
  title     = {Evaluation Method for Access-Driven Cache Attacks Using Correlation
               Coefficient},
  journal   = {{IEICE} Transactions},
  volume    = {98-A},
  number    = {1},
  pages     = {192--202},
  year      = {2015},
  url       = {http://search.ieice.org/bin/summary.php?id=e98-a_1_192},
  timestamp = {Tue, 19 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/TakahashiFAF15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/EndoHHTFA14,
  author    = {Sho Endo and
               Naofumi Homma and
               Yu{-}ichi Hayashi and
               Junko Takahashi and
               Hitoshi Fuji and
               Takafumi Aoki},
  title     = {A Multiple-Fault Injection Attack by Adaptive Timing Control Under
               Black-Box Conditions and a Countermeasure},
  booktitle = {Constructive Side-Channel Analysis and Secure Design - 5th International
               Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised
               Selected Papers},
  pages     = {214--228},
  year      = {2014},
  crossref  = {DBLP:conf/cosade/2014},
  url       = {https://doi.org/10.1007/978-3-319-10175-0_15},
  doi       = {10.1007/978-3-319-10175-0_15},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cosade/EndoHHTFA14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/RoyMIT14,
  author    = {Debapriya Basu Roy and
               Debdeep Mukhopadhyay and
               Masami Izumi and
               Junko Takahashi},
  title     = {Tile Before Multiplication: An Efficient Strategy to Optimize {DSP}
               Multiplier for Accelerating Prime Field {ECC} for {NIST} Curves},
  booktitle = {The 51st Annual Design Automation Conference 2014, {DAC} '14, San
               Francisco, CA, USA, June 1-5, 2014},
  pages     = {177:1--177:6},
  year      = {2014},
  crossref  = {DBLP:conf/dac/2014},
  url       = {http://doi.acm.org/10.1145/2593069.2593234},
  doi       = {10.1145/2593069.2593234},
  timestamp = {Fri, 24 Apr 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dac/RoyMIT14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/TakahashiF14,
  author    = {Junko Takahashi and
               Toshinori Fukunaga},
  title     = {Fault Analysis on {SIMON} Family of Lightweight Block Ciphers},
  booktitle = {Information Security and Cryptology - {ICISC} 2014 - 17th International
               Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers},
  pages     = {175--189},
  year      = {2014},
  crossref  = {DBLP:conf/icisc/2014},
  url       = {https://doi.org/10.1007/978-3-319-15943-0_11},
  doi       = {10.1007/978-3-319-15943-0_11},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/TakahashiF14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TakahashiFAF13,
  author    = {Junko Takahashi and
               Toshinori Fukunaga and
               Kazumaro Aoki and
               Hitoshi Fuji},
  title     = {Highly Accurate Key Extraction Method for Access-Driven Cache Attacks
               Using Correlation Coefficient},
  booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
               2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  pages     = {286--301},
  year      = {2013},
  crossref  = {DBLP:conf/acisp/2013},
  url       = {https://doi.org/10.1007/978-3-642-39059-3_20},
  doi       = {10.1007/978-3-642-39059-3_20},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/TakahashiFAF13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/IshikawaTTMK13,
  author    = {Takumi Ishikawa and
               Junko Takahashi and
               Hiroshi Takemura and
               Hiroshi Mizoguchi and
               Takeshi Kuwata},
  title     = {Gastric Lymph Node Cancer Detection of Multiple Features Classifier
               for Pathology Diagnosis Support System},
  booktitle = {{IEEE} International Conference on Systems, Man, and Cybernetics,
               Manchester, {SMC} 2013, United Kingdom, October 13-16, 2013},
  pages     = {2611--2616},
  year      = {2013},
  crossref  = {DBLP:conf/smc/2013},
  url       = {https://doi.org/10.1109/SMC.2013.446},
  doi       = {10.1109/SMC.2013.446},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/smc/IshikawaTTMK13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/TakahashiFS12,
  author    = {Junko Takahashi and
               Toshinori Fukunaga and
               Kazuo Sakiyama},
  title     = {Differential Fault Analysis on Stream Cipher {MUGI}},
  journal   = {{IEICE} Transactions},
  volume    = {95-A},
  number    = {1},
  pages     = {242--251},
  year      = {2012},
  url       = {http://search.ieice.org/bin/summary.php?id=e95-a_1_242},
  timestamp = {Fri, 13 Jan 2012 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/TakahashiFS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/TakahashiFGLSO12,
  author    = {Junko Takahashi and
               Toshinori Fukunaga and
               Shigeto Gomisawa and
               Yang Li and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {Fault Injection and Key Retrieval Experiments on an Evaluation Board},
  booktitle = {Fault Analysis in Cryptography},
  pages     = {313--331},
  year      = {2012},
  crossref  = {DBLP:series/isc/364229655},
  url       = {https://doi.org/10.1007/978-3-642-29656-7_18},
  doi       = {10.1007/978-3-642-29656-7_18},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/series/isc/TakahashiFGLSO12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdtc/2011,
  editor    = {Luca Breveglieri and
               Sylvain Guilley and
               Israel Koren and
               David Naccache and
               Junko Takahashi},
  title     = {2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
               2011, Tokyo, Japan, September 29, 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6075045},
  isbn      = {978-1-4577-1463-4},
  timestamp = {Tue, 12 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fdtc/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RoyRMTF11,
  author    = {Sujoy Sinha Roy and
               Chester Rebeiro and
               Debdeep Mukhopadhyay and
               Junko Takahashi and
               Toshinori Fukunaga},
  title     = {Scalar Multiplication on Koblitz Curves using tau\({}^{\mbox{2}}\)-NAF},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {318},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/318},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/RoyRMTF11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/TakahashiF10,
  author    = {Junko Takahashi and
               Toshinori Fukunaga},
  title     = {Differential Fault Analysis on {CLEFIA} with 128, 192, and 256-Bit
               Keys},
  journal   = {{IEICE} Transactions},
  volume    = {93-A},
  number    = {1},
  pages     = {136--143},
  year      = {2010},
  url       = {http://search.ieice.org/bin/summary.php?id=e93-a_1_136},
  timestamp = {Fri, 03 Dec 2010 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/TakahashiF10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LiSGFTO10,
  author    = {Yang Li and
               Kazuo Sakiyama and
               Shigeto Gomisawa and
               Toshinori Fukunaga and
               Junko Takahashi and
               Kazuo Ohta},
  title     = {Fault Sensitivity Analysis},
  booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
               Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  pages     = {320--334},
  year      = {2010},
  crossref  = {DBLP:conf/ches/2010},
  url       = {https://doi.org/10.1007/978-3-642-15031-9_22},
  doi       = {10.1007/978-3-642-15031-9_22},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ches/LiSGFTO10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/TakahashiFS10,
  author    = {Junko Takahashi and
               Toshinori Fukunaga and
               Kazuo Sakiyama},
  title     = {Fault Analysis on Stream Cipher {MUGI}},
  booktitle = {Information Security and Cryptology - {ICISC} 2010 - 13th International
               Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  pages     = {420--434},
  year      = {2010},
  crossref  = {DBLP:conf/icisc/2010},
  url       = {https://doi.org/10.1007/978-3-642-24209-0_28},
  doi       = {10.1007/978-3-642-24209-0_28},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/TakahashiFS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TakahashiF10,
  author    = {Junko Takahashi and
               Toshinori Fukunaga},
  title     = {Differential Fault Analysis on {AES} with 192 and 256-Bit Keys},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {23},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/023},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/TakahashiF10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GomisawaLTFSSO10,
  author    = {Shigeto Gomisawa and
               Yang Li and
               Junko Takahashi and
               Toshinori Fukunaga and
               Yu Sasaki and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {Efficient Differential Fault Analysis for {AES}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {336},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/336},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GomisawaLTFSSO10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/FukunagaT09,
  author    = {Toshinori Fukunaga and
               Junko Takahashi},
  title     = {Practical Fault Attack on a Cryptographic {LSI} with {ISO/IEC} 18033-3
               Block Ciphers},
  booktitle = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
               {FDTC} 2009, Lausanne, Switzerland, 6 September 2009},
  pages     = {84--92},
  year      = {2009},
  crossref  = {DBLP:conf/fdtc/2009},
  url       = {https://doi.org/10.1109/FDTC.2009.34},
  doi       = {10.1109/FDTC.2009.34},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fdtc/FukunagaT09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/RebeiroMTF09,
  author    = {Chester Rebeiro and
               Debdeep Mukhopadhyay and
               Junko Takahashi and
               Toshinori Fukunaga},
  title     = {Cache Timing Attacks on Clefia},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
               on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  pages     = {104--118},
  year      = {2009},
  crossref  = {DBLP:conf/indocrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-10628-6_7},
  doi       = {10.1007/978-3-642-10628-6_7},
  timestamp = {Fri, 19 May 2017 01:26:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/RebeiroMTF09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/TakahashiF08,
  author    = {Junko Takahashi and
               Toshinori Fukunaga},
  title     = {Improved Differential Fault Analysis on {CLEFIA}},
  booktitle = {Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
               2008, {FDTC} 2008, Washington, DC, USA, 10 August 2008},
  pages     = {25--34},
  year      = {2008},
  crossref  = {DBLP:conf/fdtc/2008},
  url       = {https://doi.org/10.1109/FDTC.2008.14},
  doi       = {10.1109/FDTC.2008.14},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fdtc/TakahashiF08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/TakahashiFY07,
  author    = {Junko Takahashi and
               Toshinori Fukunaga and
               Kimihiro Yamakoshi},
  title     = {{DFA} Mechanism on the {AES} Key Schedule},
  booktitle = {Fourth International Workshop on Fault Diagnosis and Tolerance in
               Cryptography, 2007, {FDTC} 2007: Vienna, Austria, 10 September 2007},
  pages     = {62--74},
  year      = {2007},
  crossref  = {DBLP:conf/fdtc/2007},
  url       = {https://doi.org/10.1109/FDTC.2007.4318986},
  doi       = {10.1109/FDTC.2007.4318986},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fdtc/TakahashiFY07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TakahashiF07,
  author    = {Junko Takahashi and
               Toshinori Fukunaga},
  title     = {Differential Fault Analysis on the {AES} Key Schedule},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {480},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/480},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/TakahashiF07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cosade/2014,
  editor    = {Emmanuel Prouff},
  title     = {Constructive Side-Channel Analysis and Secure Design - 5th International
               Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8622},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-10175-0},
  doi       = {10.1007/978-3-319-10175-0},
  isbn      = {978-3-319-10174-3},
  timestamp = {Sun, 21 May 2017 00:20:24 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cosade/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dac/2014,
  title     = {The 51st Annual Design Automation Conference 2014, {DAC} '14, San
               Francisco, CA, USA, June 1-5, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2593069},
  isbn      = {978-1-4503-2730-5},
  timestamp = {Wed, 28 May 2014 08:42:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dac/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2014,
  editor    = {Jooyoung Lee and
               Jongsung Kim},
  title     = {Information Security and Cryptology - {ICISC} 2014 - 17th International
               Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8949},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-15943-0},
  doi       = {10.1007/978-3-319-15943-0},
  isbn      = {978-3-319-15942-3},
  timestamp = {Fri, 26 May 2017 00:51:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2013,
  editor    = {Colin Boyd and
               Leonie Simpson},
  title     = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
               2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7959},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-39059-3},
  doi       = {10.1007/978-3-642-39059-3},
  isbn      = {978-3-642-39058-6},
  timestamp = {Thu, 25 May 2017 00:42:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/smc/2013,
  title     = {{IEEE} International Conference on Systems, Man, and Cybernetics,
               Manchester, {SMC} 2013, United Kingdom, October 13-16, 2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6689802},
  isbn      = {978-0-7695-5154-8},
  timestamp = {Fri, 15 Jan 2016 12:16:47 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/smc/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/364229655,
  editor    = {Marc Joye and
               Michael Tunstall},
  title     = {Fault Analysis in Cryptography},
  series    = {Information Security and Cryptography},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-29656-7},
  doi       = {10.1007/978-3-642-29656-7},
  isbn      = {978-3-642-29655-0},
  timestamp = {Tue, 16 May 2017 14:24:21 +0200},
  biburl    = {https://dblp.org/rec/bib/series/isc/364229655},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2010,
  editor    = {Stefan Mangard and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
               Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6225},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15031-9},
  doi       = {10.1007/978-3-642-15031-9},
  isbn      = {978-3-642-15030-2},
  timestamp = {Sun, 21 May 2017 00:18:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ches/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2010,
  editor    = {Kyung Hyune Rhee and
               DaeHun Nyang},
  title     = {Information Security and Cryptology - {ICISC} 2010 - 13th International
               Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6829},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-24209-0},
  doi       = {10.1007/978-3-642-24209-0},
  isbn      = {978-3-642-24208-3},
  timestamp = {Fri, 26 May 2017 00:51:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdtc/2009,
  editor    = {Luca Breveglieri and
               Israel Koren and
               David Naccache and
               Elisabeth Oswald and
               Jean{-}Pierre Seifert},
  title     = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
               {FDTC} 2009, Lausanne, Switzerland, 6 September 2009},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5412677},
  isbn      = {978-0-7695-3824-2},
  timestamp = {Tue, 12 May 2015 17:11:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fdtc/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2009,
  editor    = {Bimal K. Roy and
               Nicolas Sendrier},
  title     = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
               on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5922},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10628-6},
  doi       = {10.1007/978-3-642-10628-6},
  isbn      = {978-3-642-10627-9},
  timestamp = {Fri, 19 May 2017 01:26:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdtc/2008,
  editor    = {Luca Breveglieri and
               Shay Gueron and
               Israel Koren and
               David Naccache and
               Jean{-}Pierre Seifert},
  title     = {Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
               2008, {FDTC} 2008, Washington, DC, USA, 10 August 2008},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4599542},
  isbn      = {978-0-7695-3314-8},
  timestamp = {Tue, 12 May 2015 17:11:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fdtc/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdtc/2007,
  editor    = {Luca Breveglieri and
               Shay Gueron and
               Israel Koren and
               David Naccache and
               Jean{-}Pierre Seifert},
  title     = {Fourth International Workshop on Fault Diagnosis and Tolerance in
               Cryptography, 2007, {FDTC} 2007: Vienna, Austria, 10 September 2007},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4318971},
  isbn      = {0-7695-2982-8},
  timestamp = {Tue, 12 May 2015 17:11:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fdtc/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier