Search results for: Kouichi Itoh
Brain Research > 2016 > 1652 > C > 1-13
IFIP — The International Federation for Information Processing > Smart Card Research and Advanced Applications VI > Side Attacks > 99-113
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2002 > Elliptic Curve Cryptography I > 129-143
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Session 2: Attacks I > 73-90
Lecture Notes in Computer Science > Information and Communications Security > Security Implementations > 507-518
Lecture Notes in Computer Science > Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices > Hardware Implementations > 293-307
IFIP — The International Federation for Information Processing > Smart Card Research and Advanced Applications VI > Side Attacks > 99-113
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2002 > Finite Field and Modular Arithmetic II > 303-317
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems > Smartcards and Embedded Systems > 61-72
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2008 > Implementations 2 > 315-330
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2011 > PUFs > 390-406
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2003 > Countermeasures to Side Channel Leakage > 382-396
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems — CHES 2000 > Implementation of Elliptic Curve Cryptosystems > 25-40
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Security and Privacy > 459-469
Cellular and Molecular Neurobiology > 2016 > 36 > 1 > 11-26
EURASIP Journal on Information Security > 2016 > 2016 > 1 > 1-12