COSIC

Results: 193



#Item
51Studio Standart  ««««« At Flamingo Grand, we understand that the purpose of an extended holiday is to make your stay a comfortable experience. That is

Studio Standart ««««« At Flamingo Grand, we understand that the purpose of an extended holiday is to make your stay a comfortable experience. That is

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

- Date: 2011-03-29 11:12:10
    52A Critical Evaluation of Website Fingerprinting Attacks Marc Juarez1 , Sadia Afroz2 , Gunes Acar1 , Claudia Diaz1 , Rachel Greenstadt3 1 KU Leuven, ESAT/COSIC and iMinds, Leuven, Belgium

    A Critical Evaluation of Website Fingerprinting Attacks Marc Juarez1 , Sadia Afroz2 , Gunes Acar1 , Claudia Diaz1 , Rachel Greenstadt3 1 KU Leuven, ESAT/COSIC and iMinds, Leuven, Belgium

    Add to Reading List

    Source URL: homes.esat.kuleuven.be

    Language: English - Date: 2014-10-01 09:30:05
      53A MASKED RING-LWE IMPLEMENTATION Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede COSIC/KU Leuven CHES 2015, Saint-Malo, FR

      A MASKED RING-LWE IMPLEMENTATION Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede COSIC/KU Leuven CHES 2015, Saint-Malo, FR

      Add to Reading List

      Source URL: www.cryptoexperts.com

      Language: English - Date: 2015-11-13 04:48:41
        54Obfuscation for and against device fingerprinting Position Paper for Symposium on Obfuscation New York University, February 15, 2014 Gunes Acar KU Leuven, Dept. of Electrical Engineering (ESAT), COSIC, iMinds, Leuven, Be

        Obfuscation for and against device fingerprinting Position Paper for Symposium on Obfuscation New York University, February 15, 2014 Gunes Acar KU Leuven, Dept. of Electrical Engineering (ESAT), COSIC, iMinds, Leuven, Be

        Add to Reading List

        Source URL: obfuscationsymposium.org

        Language: English - Date: 2014-02-01 17:06:55
          55Introduction Addition and XOR Multiplication, Counting ARX Conclusion

          Introduction Addition and XOR Multiplication, Counting ARX Conclusion

          Add to Reading List

          Source URL: www.cosic.esat.kuleuven.be

          Language: English - Date: 2011-06-14 16:52:51
            56PhD Position: Cryptography secured against side-channel attacks COSIC, KU Leuven The Computer Security and Industrial Cryptography group (COSIC) currently has over 55 researchers. The research work of COSIC covers a broa

            PhD Position: Cryptography secured against side-channel attacks COSIC, KU Leuven The Computer Security and Industrial Cryptography group (COSIC) currently has over 55 researchers. The research work of COSIC covers a broa

            Add to Reading List

            Source URL: homes.esat.kuleuven.be

            Language: English - Date: 2015-09-08 07:48:14
              57Obfusca(on-­‐Based	
  	
   Private	
  Web	
  Search	
   Claudia	
  Diaz	
  	
   KU	
  Leuven	
  ESAT/COSIC	
   Obfusca(on	
  Symposium,	
  15	
  February	
  2014	
  

              Obfusca(on-­‐Based     Private  Web  Search   Claudia  Diaz     KU  Leuven  ESAT/COSIC   Obfusca(on  Symposium,  15  February  2014  

              Add to Reading List

              Source URL: obfuscationsymposium.org

              Language: English - Date: 2014-04-04 12:04:45
                58DPA, Bitslicing and Masking at 1 GHz Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, and Ingrid Verbauwhede KU Leuven ESAT / COSIC (Belgium)  CHES 2015

                DPA, Bitslicing and Masking at 1 GHz Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, and Ingrid Verbauwhede KU Leuven ESAT / COSIC (Belgium) CHES 2015

                Add to Reading List

                Source URL: www.cryptoexperts.com

                Language: English - Date: 2015-11-13 04:48:41
                  59Microsoft Word - PracticalInformationFSE2009final.doc

                  Microsoft Word - PracticalInformationFSE2009final.doc

                  Add to Reading List

                  Source URL: www.cosic.esat.kuleuven.be

                  Language: English - Date: 2009-02-18 13:49:48
                    60Permutation-based symmetric cryptography and Keccak  Permutation-based symmetric cryptography and Keccak Joan Daemen1 joint work with

                    Permutation-based symmetric cryptography and Keccak Permutation-based symmetric cryptography and Keccak Joan Daemen1 joint work with

                    Add to Reading List

                    Source URL: www.cosic.esat.kuleuven.be

                    Language: English - Date: 2013-03-22 12:15:12