PROOFS 2021: Keyword Index

KeywordPapers
b
Bit-interaction leakageSimulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
bootloader use-caseCombining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities
c
Chain of TrustXMSS-based Chain of Trust
Code-based Masking SchemeTowards Finding Best Linear Codes for Side-Channel Protections
d
Detection based defensesLocality Based Cache Side-channel Attack Detection
DilithiumXMSS-based Chain of Trust
f
fault injection robustnessCombining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities
FLSSMultiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
h
handshake protocolXMSS-based Chain of Trust
high-level informationLocality Based Cache Side-channel Attack Detection
i
Information-Theoretic MetricTowards Finding Best Linear Codes for Side-Channel Protections
l
linear codeTowards Finding Best Linear Codes for Side-Channel Protections
localityLocality Based Cache Side-channel Attack Detection
m
MaskingSimulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
multiple-layer sieveMultiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
p
post-quantum cryptographyXMSS-based Chain of Trust
r
RISC-VSimulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
s
serial implementationMultiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
Share-slicingSimulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
Side Channel AttackSimulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
Multiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
side-channel analysisTowards Finding Best Linear Codes for Side-Channel Protections
side-channel attacksLocality Based Cache Side-channel Attack Detection
simulationSimulation Based Evaluation of Bit-Interaction Side-Channel Leakage on RISC-V Processor
SMLSMultiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
source code static analysisCombining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities
stacking attackMultiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
symbolic executionCombining Static Analysis and Dynamic Symbolic Execution in a Toolchain to detect Fault Injection Vulnerabilities
t
TLSsMultiple-Layer Candidate Sieves Against Serial Cryptographic Implementations
w
weight distributionTowards Finding Best Linear Codes for Side-Channel Protections
x
XMSSXMSS-based Chain of Trust