Search results for: Helena Handschuh
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2001 > Symmetric Cryptography > 70-83
Information Security and Cryptography > Towards Hardware-Intrinsic Security > Physically Unclonable Functions (PUFs) > 39-53
Lecture Notes in Computer Science > Selected Areas in Cryptography > Cryptosystems and Pseudorandom Number Generators > 1-12
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems — CHES 2001 > Side Channel Attacks I > 16-27
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT’99 > Elliptic Curve Cryptosystems > 122-134
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2002 > Public Key Encryption > 263-276
Lecture Notes in Computer Science > Smart Card Research and Applications > Session 10: E cient Implementations II > 366-371
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2008 > Hash Functions I > 144-161
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems > Power Attacks II > 303-315
Lecture Notes in Computer Science > Smart Card Research and Applications > Session 10: E cient Implementations II > 372-379
Lecture Notes in Computer Science > Selected Areas in Cryptography > Attacks on Secret Key Cryptosystems > 306-318
Lecture Notes in Computer Science