Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "From Cryptography to Hardware: Analyzing Embedded Xilinx BRAM for Cryptographic Applications"
@article{DBLP:journals/jce/BhasinGHD13, author = {Shivam Bhasin and Sylvain Guilley and Annelie Heuser and Jean{-}Luc Danger}, title = {From cryptography to hardware: analyzing and protecting embedded Xilinx {BRAM} for cryptographic applications}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {4}, pages = {213--225}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0048-4}, doi = {10.1007/S13389-013-0048-4}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BhasinGHD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/BhasinGD12, author = {Shivam Bhasin and Sylvain Guilley and Jean{-}Luc Danger}, title = {From Cryptography to Hardware: Analyzing Embedded Xilinx {BRAM} for Cryptographic Applications}, booktitle = {45th Annual {IEEE/ACM} International Symposium on Microarchitecture, {MICRO} 2012, Workshops Proceedings, Vancouver, BC, Canada, December 1-5, 2012}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MICROW.2012.11}, doi = {10.1109/MICROW.2012.11}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/BhasinGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.