| 
 | 
PROOFS 2017: Author Index| Author | Papers | 
|---|
 | B |  | Basu Roy, Debapriya | Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands |  | Baumann, Christoph | Compositional Verification of Security Properties for Embedded Execution Platforms |  | Ben El Ouahma, Inès | Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes |  | D |  | Dam, Mads | Compositional Verification of Security Properties for Embedded Execution Platforms |  | Das, Poulami | Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands |  | Dasgupta, Pallab | An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach |  | E |  | Encrenaz, Emmanuelle | Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes |  | G |  | Graebnitz, Christoph | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs |  | H |  | Heydemann, Karine | Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes |  | K |  | Kumar, Ujjawal | An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach |  | M |  | Margraf, Marian | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs |  | Meunier, Quentin | Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes |  | Mukhopadhyay, Debdeep | Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands |  | Mukhopadhyay, Debdeep | An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach |  | O |  | Oswald, Manuel | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs |  | S |  | Saha, Sayandeep | An Automated Framework for Exploitable Fault Identification in Block Ciphers – A Data Mining Approach |  | Schwarz, Oliver | Compositional Verification of Security Properties for Embedded Execution Platforms |  | Soroceanu, Tudor | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs |  | W |  | Wisiol, Nils | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs |  | Z |  | Zengin, Benjamin | Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs |  
  |  
  | 
|