Wyniki wyszukiwania dla: Benedikt Gierlichs
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2011 > Elliptic Curve Cryptosystems > 143-159
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2008 > Fault Analysis 2 > 346-362
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2008 > Side-Channel Analysis 3 > 426-442
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2008 > Side Channel Cryptanalysis > 274-287
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2009 > Side Channel Analysis of Secret Key Cryptosystems > 112-127
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2008 > Side Channel Attack > 253-267
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2006 > Side Channels I > 15-29
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2010 > Symmetric-Key Cryptosystems > 112-129
Lecture Notes in Computer Science > Topics in Cryptology - CT-RSA 2010 > Side-Channel Attacks > 221-234
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2007 > Logic Styles: Masking and Routing > 107-120
Handbook of Signal Processing Systems > Applications Managing Editor: Shuvra Bhattacharyya > 161-177
IEEE Transactions on Computer-Aided Design of Integrated Circuits and... > 2015 > 34 > 7 > 1188 - 1200
Journal of Cryptographic Engineering > 2011 > 1 > 4 > 293-302
Journal of Cryptology > 2011 > 24 > 2 > 269-291