Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 53 matches
- 2023
- Tomonori Hirata, Yuichi Kaji:
Information Leakage Through Passive Timing Attacks on RSA Decryption System. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 406-413 (2023) - 2022
- Aidong Chen, Chen Hong, Xinna Shang, Hongyuan Jing, Sen Xu:
Timing leakage to break SM2 signature algorithm. J. Inf. Secur. Appl. 67: 103210 (2022) - Nir Drucker, Tomer Pelleg:
Timing Leakage Analysis of Non-constant-time NTT Implementations with Harvey Butterflies. CSCML 2022: 99-117 - Eric Rothstein Morris, Jun Sun, Sudipta Chattopadhyay:
ORIGAMI: Folding Data Structures to Reduce Timing Side-Channel Leakage. MEMOCODE 2022: 1-12 - Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Error Leakage using Timing Channel in FHE Ciphertexts from TFHE Library. IACR Cryptol. ePrint Arch. 2022: 685 (2022) - Nir Drucker, Tomer Pelleg:
Timing leakage analysis of non-constant-time NTT implementations with Harvey butterflies. IACR Cryptol. ePrint Arch. 2022: 94 (2022) - 2021
- Tsunato Nakai, Daisuke Suzuki, Fumio Omatsu, Takeshi Fujino:
Adversarial Black-Box Attacks with Timing Side-Channel Leakage. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 143-151 (2021) - Arnab Kumar Biswas:
Cryptographic Software IP Protection without Compromising Performance or Timing Side-channel Leakage. ACM Trans. Archit. Code Optim. 18(2): 20:1-20:20 (2021) - Mehran Goli, Rolf Drechsler:
ATLaS: Automatic Detection of Timing-based Information Leakage Flows for SystemC HLS Designs. ASP-DAC 2021: 67-72 - Mathieu Escouteloup, Ronan Lashermes, Jacques Fournier, Jean-Louis Lanet:
Under the Dome: Preventing Hardware Timing Information Leakage. CARDIS 2021: 233-253 - Clemens Hlauschek, Norman Lahr, Robin Leander Schröder:
On the Timing Leakage of the Deterministic Re-encryption in HQC KEM. IACR Cryptol. ePrint Arch. 2021: 1485 (2021) - 2020
- Zhen Hang Jiang, Yunsi Fei, David R. Kaeli:
Exploiting Bank Conflict-based Side-channel Timing Leakage of GPUs. ACM Trans. Archit. Code Optim. 16(4): 42:1-42:24 (2020) - Tomonori Hirata, Yuichi Kaji:
Information leakage through passive timing attacks on RSA decryption system. ISITA 2020: 392-396 - 2019
- Pablo Cañones, Boris Köpf, Jan Reineke:
On the Incomparability of Cache Algorithms in Terms of Timing Leakage. Log. Methods Comput. Sci. 15(1) (2019) - Chongxi Bao, Ankur Srivastava:
Reducing Timing Side-Channel Information Leakage Using 3D Integration. IEEE Trans. Dependable Secur. Comput. 16(4): 665-678 (2019) - 2018
- Ali Can Atici:
Methods for finding the sources of leakage in cache-timing attacks and removing the profiling phase (Önbellek-zamanlama saldırılarında sızıntı kaynaklarını bulmak ve ayrımlama fazını kaldırmak için metotlar). Sabancı University, Turkey, 2018 - Patanjali SLPSK, Milan Patnaik, Seetal Potluri, V. Kamakoti:
MLTimer: Leakage Power Minimization in Digital Circuits Using Machine Learning and Adaptive Lazy Timing Analysis. J. Low Power Electron. 14(2): 285-301 (2018) - Zelalem Birhanu Aweke, Todd M. Austin:
Øzone: Efficient execution with zero timing leakage for modern microarchitectures. DATE 2018: 1123-1128 - Kiran S. Balagani, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu:
SILK-TV: Secret Information Leakage from Keystroke Timing Videos. ESORICS (1) 2018: 263-280 - Chien-Tung Liu, Zhe-Wei Chang, Shih-Nung Wei, Jinn-Shyan Wang, Tay-Jyi Lin:
A Low-Area, Low-Power, and Low-Leakage Error-Detecting Latch for Timing-Error Resilient System Designs. SoCC 2018: 1-6 - Otávio Oliveira Napoli, Vanderson Martins do Rosário, Diego de Freitas Aranha, Edson Borin:
Evaluation of Timing Side-Channel Leakage on a Multiple-Target Dynamic Binary Translator. WSCAD 2018: 198-204 - Otávio Oliveira Napoli, Vanderson Martins do Rosario, Diego de Freitas Aranha, Edson Borin:
Evaluation and Mitigation of Timing Side-Channel Leakages on Multiple-Target Dynamic Binary Translators. WSCAD (Selected Papers) 2018: 152-167 - Pablo Cañones, Boris Köpf, Jan Reineke:
On the Incomparability of Cache Algorithms in Terms of Timing Leakage. CoRR abs/1807.01240 (2018) - 2017
- Zelalem Birhanu Aweke, Todd M. Austin:
Øzone: Efficient execution with zero timing leakage for modern microarchitectures. HOST 2017: 153 - Yuya Nishio, Atsuki Kobayashi, Kiichi Niitsu:
A 28μm2, 0.11Hz, 4.5pW gate leakage timer using differential leakage technique in 55nm DDC CMOS for small-footprint, low-frequency and low-power timing generation. ICECS 2017: 368-371 - Zelalem Birhanu Aweke, Todd M. Austin:
Ozone: Efficient Execution with Zero Timing Leakage for Modern Microarchitectures. CoRR abs/1703.07706 (2017) - 2016
- Xun Gong, Negar Kiyavash:
Quantifying the Information Leakage in Timing Side Channels in Deterministic Work-Conserving Schedulers. IEEE/ACM Trans. Netw. 24(3): 1841-1852 (2016) - 2015
- George Gonzalez, Murari Mani, Mahesh Sharma:
Large-scale multi-corner leakage optimization under the sign-off timing environment. ISQED 2015: 40-45 - 2014
- Shi-Yu Huang, Li-Ren Huang:
PLL-Assisted Timing Circuit for Accurate TSV Leakage Binning. IEEE Des. Test 31(4): 36-42 (2014) - Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Marten van Dijk, Omer Khan, Srinivas Devadas:
Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs. HPCA 2014: 213-224
skipping 23 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 12:20 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint