default search action
Dan Page
Person information
- affiliation: University of Bristol, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Hao Cheng, Daniel Page, Weijia Wang:
eLIMInate: a Leakage-focused ISE for Masked Implementation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 329-358 (2024) - [c52]Llewellyn Forward, Io Limmer, Joseph Hallett, Dan Page:
Super Mario in the Pernicious Kingdoms Classifying Glitches in Old Games. GAS 2024: 36-43 - [i44]Llewellyn Forward, Io Limmer, Joseph Hallett, Dan Page:
Super Mario in the Pernicious Kingdoms: Classifying glitches in old games. CoRR abs/2404.14870 (2024) - [i43]Hao Cheng, Johann Großschädl, Ben Marshall, Daniel Page, Markku-Juhani O. Saarinen:
SoK: Instruction Set Extensions for Cryptographers. IACR Cryptol. ePrint Arch. 2024: 1323 (2024) - 2023
- [j22]Daniel Page, Robert W. Lindeman, Stephan G. Lukosch:
Identifying Strategies to Mitigate Cybersickness in Virtual Reality Induced by Flying with an Interactive Travel Interface. Multimodal Technol. Interact. 7(5): 47 (2023) - [j21]Hao Cheng, Johann Großschädl, Ben Marshall, Dan Page, Thinh Hung Pham:
RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1): 193-237 (2023) - [i42]Hao Cheng, Daniel Page:
eLIMInate: a Leakage-focused ISE for Masked Implementation. IACR Cryptol. ePrint Arch. 2023: 966 (2023) - 2022
- [j20]Ben Marshall, Dan Page, James Webb:
MIRACLE: MIcRo-ArChitectural Leakage Evaluation A study of micro-architectural power leakage across many devices. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 175-220 (2022) - [c51]Si Gao, Elisabeth Oswald, Dan Page:
Towards Micro-architectural Leakage Simulators: Reverse Engineering Micro-architectural Leakage Features Is Practical. EUROCRYPT (3) 2022: 284-311 - [i41]Hao Cheng, Johann Großschädl, Ben Marshall, Dan Page, Thinh Hung Pham:
RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography. IACR Cryptol. ePrint Arch. 2022: 1697 (2022) - 2021
- [j19]Ben Marshall, G. Richard Newell, Dan Page, Markku-Juhani O. Saarinen, Claire Wolf:
The design of scalar AES Instruction Set Extensions for RISC-V. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 109-136 (2021) - [j18]Si Gao, Johann Großschädl, Ben Marshall, Dan Page, Thinh Hung Pham, Francesco Regazzoni:
An Instruction Set Extension to Support Software-Based Masking. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 283-325 (2021) - [c50]Ben Marshall, Daniel Page, Thinh Hung Pham:
A lightweight ISE for ChaCha on RISC-V. ASAP 2021: 25-32 - [c49]Thinh Hung Pham, Ben Marshall, Alexander Fell, Siew-Kei Lam, Daniel Page:
XDIVINSA: eXtended DIVersifying INStruction Agent to Mitigate Power Side-Channel Leakage. ASAP 2021: 179-186 - [i40]Ben Marshall, Dan Page, James Webb:
MIRACLE: MIcRo-ArChitectural Leakage Evaluation. IACR Cryptol. ePrint Arch. 2021: 261 (2021) - [i39]Si Gao, Elisabeth Oswald, Dan Page:
Reverse Engineering the Micro-Architectural Leakage Features of a Commercial Processor. IACR Cryptol. ePrint Arch. 2021: 794 (2021) - [i38]Ben Marshall, Daniel Page, Thinh Hung Pham:
A lightweight ISE for ChaCha on RISC-V. IACR Cryptol. ePrint Arch. 2021: 1030 (2021) - [i37]Thinh Hung Pham, Ben Marshall, Alexander Fell, Siew-Kei Lam, Daniel Page:
XDIVINSA: eXtended DIVersifying INStruction Agent to Mitigate Power Side-Channel Leakage. IACR Cryptol. ePrint Arch. 2021: 1053 (2021) - [i36]Joppe W. Bos, Thorsten Kleinjung, Dan Page:
Efficient Modular Multiplication. IACR Cryptol. ePrint Arch. 2021: 1151 (2021) - [i35]Ben Marshall, Dan Page:
SME: Scalable Masking Extensions. IACR Cryptol. ePrint Arch. 2021: 1416 (2021) - 2020
- [j17]Si Gao, Ben Marshall, Dan Page, Elisabeth Oswald:
Share-slicing: Friend or Foe? IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 152-174 (2020) - [j16]Si Gao, Ben Marshall, Dan Page, Thinh Hung Pham:
FENL: an ISE to mitigate analogue micro-architectural leakage. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 73-98 (2020) - [c48]Ben Marshall, Daniel Page, Thinh Hung Pham:
Implementing the Draft RISC-V Scalar Cryptography Extensions. HASP@MICRO 2020: 1:1-1:8 - [i34]Johann Großschädl, Ben Marshall, Dan Page, Thinh Hung Pham, Francesco Regazzoni:
An Instruction Set Extension to Support Software-Based Masking. IACR Cryptol. ePrint Arch. 2020: 773 (2020) - [i33]Ben Marshall, G. Richard Newell, Dan Page, Markku-Juhani O. Saarinen, Claire Wolf:
The design of scalar AES Instruction Set Extensions for RISC-V. IACR Cryptol. ePrint Arch. 2020: 930 (2020)
2010 – 2019
- 2018
- [j15]Daniel Page, Matthieu Rivain:
Preface to TCHES 2018. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): I-IV (2018) - [i32]Marguerite Delcourt, Thorsten Kleinjung, Arjen K. Lenstra, Shubhojyoti Nath, Dan Page, Nigel P. Smart:
Using the Cloud to Determine Key Strengths - Triennial Update. IACR Cryptol. ePrint Arch. 2018: 1221 (2018) - 2017
- [j14]Elena Andreeva, Guy Barwell, Ritam Bhaumik, Mridul Nandi, Dan Page, Martijn Stam:
Turning Online Ciphers Off. IACR Trans. Symmetric Cryptol. 2017(2): 105-142 (2017) - 2015
- [c47]Jake Longo, Elke De Mulder, Dan Page, Michael Tunstall:
SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip. CHES 2015: 620-640 - [c46]Guy Barwell, Daniel Page, Martijn Stam:
Rogue Decryption Failures: Reconciling AE Robustness Notions. IMACC 2015: 94-111 - [i31]Elena Andreeva, Guy Barwell, Dan Page, Martijn Stam:
Turning Online Ciphers Off. IACR Cryptol. ePrint Arch. 2015: 485 (2015) - [i30]Jake Longo, Elke De Mulder, Daniel Page, Michael Tunstall:
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip. IACR Cryptol. ePrint Arch. 2015: 561 (2015) - [i29]Guy Barwell, Dan Page, Martijn Stam:
Rogue Decryption Failures: Reconciling AE Robustness Notions. IACR Cryptol. ePrint Arch. 2015: 895 (2015) - 2014
- [b2]Daniel Page, Nigel P. Smart:
What Is Computer Science? - An Information Security Perspective. Undergraduate Topics in Computer Science, Springer 2014, ISBN 978-3-319-04041-7, pp. 3-227 - [j13]Vijay Kumar, George C. Oikonomou, Theo Tryfonas, Dan Page, Iain W. Phillips:
Digital investigations for IPv6-based Wireless Sensor Networks. Digit. Investig. 11(Supplement 2): S66-S75 (2014) - [c45]Jake Longo, Daniel P. Martin, Elisabeth Oswald, Daniel Page, Martijn Stam, Michael Tunstall:
Simulatable Leakage: Analysis, Pitfalls, and New Constructions. ASIACRYPT (1) 2014: 223-242 - [i28]Jake Longo Galea, Daniel P. Martin, Elisabeth Oswald, Daniel Page, Martijn Stam:
Making and Breaking Leakage Simulators. IACR Cryptol. ePrint Arch. 2014: 357 (2014) - 2013
- [c44]Valentina Banciu, Simon Hoerder, Dan Page:
Light-weight primitive, feather-weight security: a cryptanalytic knock-out. WESS 2013: 3:1-3:10 - [c43]Simon Hoerder, Kimmo Järvinen, Daniel Page:
On Secure Embedded Token Design. WISTP 2013: 112-128 - [i27]Simon Hoerder, Kimmo Järvinen, Dan Page:
On secure embedded token design (Long Version) - Quasi-looped Yao circuits and bounded leakage. IACR Cryptol. ePrint Arch. 2013: 168 (2013) - [i26]Philipp Grabher, Dan Page, Marcin Wójcik:
On the (re)design of an FPGA-based PUF. IACR Cryptol. ePrint Arch. 2013: 195 (2013) - [i25]Valentina Banciu, Simon Hoerder, Dan Page:
Light-weight primitive, feather-weight security? A cryptanalytic knock-out. (Preliminary results). IACR Cryptol. ePrint Arch. 2013: 421 (2013) - 2012
- [j12]Philipp Grabher, Johann Großschädl, Simon Hoerder, Kimmo Järvinen, Daniel Page, Stefan Tillich, Marcin Wójcik:
An exploration of mechanisms for dynamic cryptographic instruction set extension. J. Cryptogr. Eng. 2(1): 1-18 (2012) - [j11]Roberto Avanzi, Simon Hoerder, Dan Page, Michael Tunstall:
Erratum to: Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems. J. Cryptogr. Eng. 2(1): 75 (2012) - [c42]Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall:
Compiler Assisted Masking. CHES 2012: 58-75 - [c41]Billy Bob Brumley, Manuel Barbosa, Dan Page, Frederik Vercauteren:
Practical Realisation and Elimination of an ECC-Related Software Bug Attack. CT-RSA 2012: 171-186 - [c40]Kimmo Järvinen, Céline Blondeau, Dan Page, Michael Tunstall:
Harnessing Biased Faults in Attacks on ECC-Based Signature Schemes. FDTC 2012: 72-82 - [c39]Robert Beat, Philipp Grabher, Daniel Page, Stefan Tillich, Marcin Wójcik:
On reconfigurable fabrics and generic side-channel countermeasures. FPL 2012: 663-666 - [c38]Thorsten Kleinjung, Arjen K. Lenstra, Dan Page, Nigel P. Smart:
Using the Cloud to Determine Key Strengths. INDOCRYPT 2012: 17-39 - [c37]Johann Großschädl, Dan Page, Stefan Tillich:
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices. WISTP 2012: 189-207 - [p2]Nadia El Mrabet, Dan Page, Frederik Vercauteren:
Fault Attacks on Pairing-Based Cryptography. Fault Analysis in Cryptography 2012: 221-236 - [i24]Robert Beat, Philipp Grabher, Dan Page, Stefan Tillich, Marcin Wójcik:
On Reconfigurable Fabrics and Generic Side-Channel Countermeasures. IACR Cryptol. ePrint Arch. 2012: 353 (2012) - 2011
- [j10]Roberto Avanzi, Simon Hoerder, Dan Page, Michael Tunstall:
Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems. J. Cryptogr. Eng. 1(4): 271-281 (2011) - [c36]Billy Bob Brumley, Dan Page:
Bit-Sliced Binary Normal Basis Multiplication. IEEE Symposium on Computer Arithmetic 2011: 205-212 - [c35]Philipp Grabher, Johann Großschädl, Simon Hoerder, Kimmo Järvinen, Dan Page, Stefan Tillich, Marcin Wójcik:
An Exploration of Mechanisms for Dynamic Cryptographic Instruction Set Extension. CHES 2011: 1-16 - [c34]Tobias Vejda, Johann Großschädl, Dan Page:
A Unified Multiply/Accumulate Unit for Pairing-Based Cryptography over Prime, Binary and Ternary Fields. DSD 2011: 658-666 - [c33]Manuel Barbosa, Andrew Moss, Dan Page, Nuno F. Rodrigues, Paulo F. Silva:
Type Checking Cryptography Implementations. FSEN 2011: 316-334 - [c32]Antoine Amarilli, Sascha Müller, David Naccache, Dan Page, Pablo Rauzy, Michael Tunstall:
Can Code Polymorphism Limit Information Leakage? WISTP 2011: 1-21 - [c31]Simon Hoerder, Marcin Wójcik, Stefan Tillich, Daniel Page:
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture. WISTP 2011: 160-174 - [i23]Antoine Amarilli, Sascha Müller, David Naccache, Daniel Page, Pablo Rauzy, Michael Tunstall:
Can Code Polymorphism Limit Information Leakage? IACR Cryptol. ePrint Arch. 2011: 99 (2011) - [i22]Thorsten Kleinjung, Arjen K. Lenstra, Dan Page, Nigel P. Smart:
Using the Cloud to Determine Key Strengths. IACR Cryptol. ePrint Arch. 2011: 254 (2011) - [i21]Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall:
Automatic Insertion of DPA Countermeasures. IACR Cryptol. ePrint Arch. 2011: 412 (2011) - [i20]Billy Bob Brumley, Manuel Barbosa, Dan Page, Frederik Vercauteren:
Practical realisation and elimination of an ECC-related software bug attack. IACR Cryptol. ePrint Arch. 2011: 633 (2011) - [i19]Johann Großschädl, Dan Page:
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices. IACR Cryptol. ePrint Arch. 2011: 712 (2011) - 2010
- [c30]Liqun Chen, Dan Page, Nigel P. Smart:
On the Design and Implementation of an Efficient DAA Scheme. CARDIS 2010: 223-237 - [c29]Andrew Moss, Dan Page:
Bridging the gap between symbolic and efficient AES implementations. PEPM 2010: 101-110 - [i18]Roberto Maria Avanzi, Simon Hoerder, Daniel Page, Michael Tunstall:
Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems. IACR Cryptol. ePrint Arch. 2010: 479 (2010) - [i17]Simon Hoerder, Marcin Wójcik, Stefan Tillich, Dan Page:
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture. IACR Cryptol. ePrint Arch. 2010: 614 (2010)
2000 – 2009
- 2009
- [b1]Daniel Page:
Practical Introduction to Computer Architecture. Texts in Computer Science, Springer 2009, ISBN 978-1-84882-255-9, pp. I-XXII, 1-641 - [j9]Manuel Barbosa, Andrew Moss, Dan Page:
Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography. J. Cryptol. 22(2): 259-281 (2009) - [c28]Philipp Grabher, Johann Großschädl, Dan Page:
Non-deterministic processors: FPGA-based analysis of area, performance and security. WESS 2009 - [c27]Manuel Koschuch, Johann Großschädl, Dan Page, Philipp Grabher, Matthias Hudler, Michael Krüger:
Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems. ICICS 2009: 63-79 - [c26]Johann Großschädl, Elisabeth Oswald, Dan Page, Michael Tunstall:
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications. ICISC 2009: 176-192 - [c25]Endre Bangerter, Manuel Barbosa, Daniel J. Bernstein, Ivan Damgård, Daniel Page, Jakob Illeborg Pagter, Ahmad-Reza Sadeghi, Sampo Sovio:
Using Compilers to Enhance Cryptographic Product Development. ISSE 2009: 291-301 - [c24]Andrew Moss, Dan Page:
Program interpolation. PEPM 2009: 31-40 - [p1]Claire Whelan, Dan Page, Frederik Vercauteren, Michael Scott, William P. Marnane:
Implementation Attacks & Countermeasures. Identity-Based Cryptography 2009: 226-243 - [i16]Johann Großschädl, Elisabeth Oswald, Dan Page, Michael Tunstall:
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications. IACR Cryptol. ePrint Arch. 2009: 538 (2009) - [i15]Liqun Chen, Dan Page, Nigel P. Smart:
On the Design and Implementation of an Efficient DAA Scheme. IACR Cryptol. ePrint Arch. 2009: 598 (2009) - 2008
- [j8]Nigel P. Smart, Elisabeth Oswald, Daniel Page:
Randomised representations. IET Inf. Secur. 2(2): 19-27 (2008) - [c23]Philipp Grabher, Johann Großschädl, Dan Page:
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography. CHES 2008: 331-345 - [c22]Johann Großschädl, Tobias Vejda, Dan Page:
Reassessing the TCG Specifications for Trusted Computing in Mobile and Embedded Systems. HOST 2008: 84-90 - [c21]Philipp Grabher, Johann Großschädl, Dan Page:
On Software Parallel Implementation of Cryptographic Pairings. Selected Areas in Cryptography 2008: 35-50 - [i14]Philipp Grabher, Johann Großschädl, Dan Page:
On Software Parallel Implementation of Cryptographic Pairings. IACR Cryptol. ePrint Arch. 2008: 205 (2008) - 2007
- [j7]Peter James Leadbitter, Dan Page, Nigel P. Smart:
Nondeterministic Multithreading. IEEE Trans. Computers 56(7): 992-998 (2007) - [c20]Philipp Grabher, Johann Großschädl, Dan Page:
Cryptographic Side-Channels from Low-Power Cache Memory. IMACC 2007: 170-184 - [c19]Andrew Moss, Dan Page, Nigel P. Smart:
Toward Acceleration of RSA Using 3D Graphics Hardware. IMACC 2007: 364-383 - [c18]Manuel Barbosa, Andrew Moss, Dan Page:
Compiler Assisted Elliptic Curve Cryptography. OTM Conferences (2) 2007: 1785-1802 - [c17]Tobias Vejda, Dan Page, Johann Großschädl:
Instruction Set Extensions for Pairing-Based Cryptography. Pairing 2007: 208-224 - [i13]Manuel Barbosa, Andrew Moss, Dan Page:
Compiler Assisted Elliptic Curve Cryptography. IACR Cryptol. ePrint Arch. 2007: 53 (2007) - [i12]Andrew Moss, Dan Page, Nigel P. Smart:
Executing Modular Exponentiation on a Graphics Accelerator. IACR Cryptol. ePrint Arch. 2007: 187 (2007) - 2006
- [j6]Robert Granger, Dan Page, Martijn Stam:
On Small Characteristic Algebraic Tori in Pairing-Based Cryptography. LMS J. Comput. Math. 9: 64-85 (2006) - [j5]Dan Page, Frederik Vercauteren:
A Fault Attack on Pairing-Based Cryptography. IEEE Trans. Computers 55(9): 1075-1080 (2006) - [c16]Robert Granger, Dan Page, Nigel P. Smart:
High Security Pairing-Based Cryptography Revisited. ANTS 2006: 480-494 - [c15]Dan Page, Jamil Kawa, Charles C. Chiang:
DFM: swimming upstream. ACM Great Lakes Symposium on VLSI 2006: 1 - [c14]Arjen K. Lenstra, Dan Page, Martijn Stam:
Discrete Logarithm Variants of VSH. VIETCRYPT 2006: 229-242 - [i11]Robert Granger, Dan Page, Nigel P. Smart:
High Security Pairing-Based Cryptography Revisited. IACR Cryptol. ePrint Arch. 2006: 59 (2006) - [i10]Dan Page:
A Note On Side-Channels Resulting From Dynamic Compilation. IACR Cryptol. ePrint Arch. 2006: 349 (2006) - 2005
- [j4]Robert Granger, Dan Page, Martijn Stam:
Hardware and Software Normal Basis Arithmetic for Pairing-Based Cryptography in Characteristic Three. IEEE Trans. Computers 54(7): 852-860 (2005) - [c13]Philipp Grabher, Dan Page:
Hardware Acceleration of the Tate Pairing in Characteristic Three. CHES 2005: 398-411 - [c12]Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff:
Practical Cryptography in High Dimensional Tori. EUROCRYPT 2005: 234-250 - [c11]Manuel Barbosa, Dan Page:
On the Automatic Construction of Indistinguishable Operations. IMACC 2005: 233-247 - [i9]Manuel Barbosa, Richard Noad, Daniel Page, Nigel P. Smart:
First Steps Toward a Cryptography-Aware Language and Compiler. IACR Cryptol. ePrint Arch. 2005: 160 (2005) - [i8]Manuel Barbosa, Dan Page:
On the Automatic Construction of Indistinguishable Operations. IACR Cryptol. ePrint Arch. 2005: 174 (2005) - [i7]Dan Page:
Partitioned Cache Architecture as a Side-Channel Defence Mechanism. IACR Cryptol. ePrint Arch. 2005: 280 (2005) - 2004
- [j3]Dan Page, Nigel P. Smart:
Parallel Cryptographic Arithmetic Using a Redundant Montgomery Representation. IEEE Trans. Computers 53(11): 1474-1482 (2004) - [c10]Robert Granger, Andrew J. Holt, Dan Page, Nigel P. Smart, Frederik Vercauteren:
Function Field Sieve in Characteristic Three. ANTS 2004: 223-234 - [c9]Robert Granger, Dan Page, Martijn Stam:
A Comparison of CEILIDH and XTR. ANTS 2004: 235-249 - [c8]Peter James Leadbitter, Dan Page, Nigel P. Smart:
Attacking DSA Under a Repeated Bits Assumption. CHES 2004: 428-440 - [c7]Dan Page, Martijn Stam:
On XTR and Side-Channel Analysis. Selected Areas in Cryptography 2004: 54-68 - [i6]Robert Granger, Dan Page, Martijn Stam:
On Small Characteristic Algebraic Tori in Pairing-Based Cryptography. IACR Cryptol. ePrint Arch. 2004: 132 (2004) - [i5]Robert Granger, Dan Page, Martijn Stam:
Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three. IACR Cryptol. ePrint Arch. 2004: 157 (2004) - [i4]Dan Page, Nigel P. Smart, Frederik Vercauteren:
A comparison of MNT curves and supersingular curves. IACR Cryptol. ePrint Arch. 2004: 165 (2004) - [i3]Dan Page, Frederik Vercauteren:
Fault and Side-Channel Attacks on Pairing Based Cryptography. IACR Cryptol. ePrint Arch. 2004: 283 (2004) - [i2]Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff:
Practical Cryptography in High Dimensional Tori. IACR Cryptol. ePrint Arch. 2004: 352 (2004) - 2003
- [j2]Daniel Page:
Defending against cache-based side-channel attacks. Inf. Secur. Tech. Rep. 8(1): 30-44 (2003) - [c6]James Irwin, Dan Page:
Using Media Processors for Low-Memory AES Implementation. ASAP 2003: 144-154 - 2002
- [j1]Keith Harrison, Dan Page, Nigel P. Smart:
Software Implementation of Finite Fields of Characteristic Three, for Use in Pairing-based Cryptosystems. LMS J. Comput. Math. 5: 181-193 (2002) - [c5]James Irwin, David May, Henk L. Muller, Dan Page:
Predictable Instruction Caching for Media Processors. ASAP 2002: 141-150 - [c4]James Irwin, Dan Page, Nigel P. Smart:
Instruction Stream Mutation for Non-Deterministic Processors. ASAP 2002: 286-295 - [c3]Dan Page, Nigel P. Smart:
Hardware Implementation of Finite Fields of Characteristic Three. CHES 2002: 529-539 - [c2]Henk L. Muller, Dan Page, James Irwin, David May:
Caches with Compositional Performance. Embedded Processor Design Challenges 2002: 242-259 - [i1]Dan Page:
Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel. IACR Cryptol. ePrint Arch. 2002: 169 (2002)
1990 – 1999
- 1999
- [c1]David May, Dan Page, James Irwin, Henk L. Muller:
Microcaches. HiPC 1999: 21-27
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 00:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint