Verifying Constant-Time Implementations

AuthID
P-00K-THF
5
Author(s)
Dupressoir, F
·
Emmi, M
Tipo de Documento
Proceedings Paper
Year published
2016
Publicado
in PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM
Páginas: 53-70 (18)
Conference
25Th Usenix Security Symposium, Date: AUG 10-12, 2016, Location: Austin, TX, Patrocinadores: USENIX, facebook, NSF, Cisco, Google, Microsoft, Neustar, IBM Res, Symantec, ACM Queue, ADMIN, CRC Press, Linux Pro Magazine, NetApp, VMware, LXer, UserFriendly Org, OReilly Media, No Starch Press, Virus Bulletin
Indexing
Publication Identifiers
DBLP: conf/uss/AlmeidaBBDE16
Wos: WOS:000385263000004
Export Publication Metadata
Citações
Oops! It looks like you don't have access to this content.

This section is restricted to uses with b-on access.



CORE Conference
No information about CORE Rank

During the preprocessing phase, only publications of type 'Proceedings Paper' or 'Proceedings' are automatically processed to identify their CORE Rank.

TIP: If your publication's CORE Rank is missing, you can contact with your institutional manager to have the correct ranking manually added to the record.

Journal Factors
Oops! It looks like you don't have access to this content.

This section is restricted to uses with b-on access.

Info
At this moment we don't have any links to full text documens.