Search results for: Stefan Mangard
Journal of Cryptographic Engineering > 2018 > 8 > 2 > 109-124
Journal of Cryptographic Engineering > 2019 > 9 > 2 > 137-158
IEEE Transactions on Circuits and Systems I: Regular Papers > 2017 > 64 > 9 > 2481 - 2494
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2005 > Hardware Attacks and Countermeasures I > 157-171
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2005 > Hardware Attacks and Countermeasures I > 172-186
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Security of Limited Devices > 239-252
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2004 > Side-Channel Attacks > 222-235
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2006 > Hardware Attacks and Countermeasures I > 76-90
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2007 > Logic Styles: Masking and Routing > 81-94
Lecture Notes in Computer Science > Information Security and Cryptology — ICISC 2002 > Side-Channel Attacks > 343-358
Lecture Notes in Computer Science > Advanced Encryption Standard – AES > Hardware Implementations > 98-112
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2006 > Side-Channel Attacks > 192-207
Lecture Notes in Computer Science > Information Security Applications > Smart Cards/Secure Hardware > 160-172
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Cryptanalysis > 141-157
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2007 > Security Issues for RF and RFID > 320-333
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2010 > Symmetric-Key Cryptosystems > 112-129