Search results for: Stefan Tillich
Lecture Notes in Computer Science > Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication > Hardware Implementation > 160-174
Lecture Notes in Computer Science > Computer and Information Sciences - ISCIS 2004 > Software Engineering and Programming Systems > 935-944
Lecture Notes in Computer Science > Smart Card Research and Advanced Applications > Implementations and Hardware Security 1 > 151-165
Lecture Notes in Computer Science > Arithmetic of Finite Fields > Efficient Implementation and Architectures > 40-54
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2011 > FPGA Implementation > 1-16
Lecture Notes in Computer Science > Communications and Multimedia Security > Applied Cryptography > 11-21
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2006 > Efficient Hardware II > 430-444
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2006 > Side-Channel Attacks > 192-207
Lecture Notes in Computer Science > Advances in Computer Systems Architecture > Session 4A: Application-Specific Systems > 282-295
Lecture Notes in Computer Science > Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks > Performance and Security > 112-127
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Cryptanalysis > 141-157
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2005 > Low Resources > 75-90
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2006 > Efficient Hardware I > 270-284
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2007 > Implementation Cost of Countermeasures > 303-319
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2008 > Side-Channel Analysis 2 > 228-243
Lecture Notes in Computer Science > Embedded Computer Systems: Architectures, Modeling, and Simulation > Architectures and Implementations > 457-466
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2008 > Improved AES Implementations > 170-186
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Information Security and Hiding (ISH 2005) Workshop > 665-675
Journal of Cryptographic Engineering > 2014 > 4 > 3 > 157-171