PROOFS 2017:Author Index

AuthorPapers
B
Basu Roy, DebapriyaAutomatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands
Baumann, ChristophCompositional Verification of Security Properties for Embedded Execution Platforms
Ben El Ouahma, InèsSymbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes
D
Dam, MadsCompositional Verification of Security Properties for Embedded Execution Platforms
Das, PoulamiAutomatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands
Dasgupta, PallabAn Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach
E
Encrenaz, EmmanuelleSymbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes
G
Graebnitz, ChristophWhy Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs
H
Heydemann, KarineSymbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes
K
Kumar, UjjawalAn Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach
M
Margraf, MarianWhy Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs
Meunier, QuentinSymbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes
Mukhopadhyay, DebdeepAutomatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands
Mukhopadhyay, DebdeepAn Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach
O
Oswald, ManuelWhy Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs
S
Saha, SayandeepAn Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach
Schwarz, OliverCompositional Verification of Security Properties for Embedded Execution Platforms
Soroceanu, TudorWhy Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs
W
Wisiol, NilsWhy Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs
Z
Zengin, BenjaminWhy Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs