Search results for: Elisabeth Oswald
Gastro-News > 2018 > 5 > 5 > 38-44
Lecture Notes in Computer Science > Information, Security and Cryptology – ICISC 2009 > Side Channel Attack > 176-192
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2005 > Hardware Attacks and Countermeasures I > 157-171
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems — CHES 2001 > Side Channel Attacks I > 39-50
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Security of Limited Devices > 239-252
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2002 > Elliptic Curve Cryptography I > 82-97
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2006 > Side-Channel Attacks > 192-207
Lecture Notes in Computer Science > Information Security Applications > Smart Cards/Secure Hardware > 160-172
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2011 > Leakage and Side Channels > 316-334
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2003 > Side Channel Attack Methodology > 35-50
Lecture Notes in Computer Science > Information Security Applications > Side-Channel Attacks > 440-456
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2010 > Symmetric-Key Cryptosystems > 112-129
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2002 > Efficient Hardware Implementations > 67-78
Lecture Notes in Computer Science > Information Security Applications > Side-Channel Attacks > 292-305
Lecture Notes in Computer Science > Information Security Applications > Smart Card and Secure Hardware(1) > 14-27