1
Table of Contents:
“... execution environment resilience: A white-box approach: Engineering Cross-Layer Fault Tolerance in Many-Core Systems -- Risk assessment based cloudification -- Stochastic Model-Based Analysis of Energy Consumption in a Rail Road Switch Heating System...”
Full text
Full text
2
Eisenbarth, Thomas.
2015
Table of Contents:
“...The SIMON and SPECK Block Ciphers on AVR 8-Bit Microcontrollers -- The Multiplicative Complexity of Boolean Functions on Four and Five Variables -- A Flexible and Compact Hardware Architecture for the SIMON Block Cipher -- AES Smaller Than S-Box...”2015
Full text
3
Bordeleau, Francis.
2015
Table of Contents:
“... Modeling Tools- A Controlled Experiment -- Opening the Black-Box of Model Transformation -- Type Inference in Flexible Model-Driven Engineering....”2015
Full text
4
Merayo, Mercedes G.
2014
Table of Contents:
“...: Automatic Test Set Generator for Embedded Reactive Systems -- Well-Defined Coverage Metrics for the Glass Box Test -- Industrial Experiences -- Cutting Time-to-Market by Adopting Automated Regression Testing in a Simulated Environment -- Testing Robotized Paint...”2014
Full text
5
Prouff, Emmanuel.
2014
Table of Contents:
“... for Efficient MIA -- Generic DPA attacks: curse or blessing? -- Template Attacks on Different Devices -- Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis -- A Multiple-Fault Injection Attack by Adaptive Timing Control under Black-Box...”2014
Full text
6
Atluri, Vijay
2014
Table of Contents:
“... the Traveling Salesman Problem with Limited Disclosure -- ELITE: zEro Links Identity managemenT systEm -- Dynamic Workflow Adjustment with Security Constraints -- Consistent Query Plan Generation in Secure Cooperative Data Access -- Hunting the Unknown: White-Box...”2014
Full text
7
Prouff, Emmanuel.
2013
Table of Contents:
“... Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers -- Updated Recommendations for Blinded Exponentiation vs. Single Trace Analysis -- On 3-Share Threshold Implementations for 4-Bit S-boxes -- Collision-Correlation...”2013
Full text
8
Eyers, David.
2013
Table of Contents:
“... -- Sprinkler — Reliable Broadcast for Geographically Dispersed Datacenters -- Transactional Failure Recovery for a Distributed Key-Value Store -- Views and Transactional Storage for Large Graphs -- Efficient Batched Synchronization in Drop box-Like Cloud Storage...”2013
Full text
9
Pierson, Jean-Marc.
2013
Table of Contents:
“...Modeling and monitoring of power consumption -- Solving some Mysteries in Power Monitoring of Servers: Take Care of your Wattmeters! -- Energy Box: A Trace-driven Tool for Data Transmission Energy Consumption Studies -- Myths in PMC-based Power...”2013
Full text
10
Knudsen, Lars R.
2013
Table of Contents:
“...Cryptanalysis -- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers -- A New Method for Solving Polynomial Systems with Noise over F2 and Its Applications in Cold Boot Key Recovery -- Cryptanalysis of the Xiao – Lai White-Box...”2013
Full text
11
Wang, Guojun.
2013
Table of Contents:
“... Attack to AES Using Reduced Searching Space -- An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux -- Towards an Open Framework Leveraging a Trusted Execution Environment -- Secure Re-publication of Dynamic Big Data....”2013
Full text
12
Table of Contents:
“... for Serpentine Channel Heat Sink -- Towards Non-linear ConstraintEstimation for Expensive Optimization Repair Methods for Box Constraints Revisited -- Scalability of Population-Based Search Heuristics for Many-Objective Optimization -- On GPU Based Fitness Evaluation...”
Full text
Full text
13
Bogdanov, Andrey.
2012
Table of Contents:
“... Ciphers -- Performance and Security Evaluation of AES S-Box-Based Glitch PUFs on FPGAs -- Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack -- Towards Formal Analysis of Key Control in Group Key Agreement Protocols -- Some...”2012
Full text
14
Manulis, Mark.
2012
Table of Contents:
“...Cryptanalysis -- Network security -- Cryptographic protocols -- Encryption -- S-box theory....”2012
Full text