Search results for: Johann Großschädl
Journal of Cryptographic Engineering > 2019 > 9 > 3 > 283-302
Security and Communication Networks > 9 > 18 > 5401 - 5411
Lecture Notes in Computer Science > Information, Security and Cryptology – ICISC 2009 > Side Channel Attack > 176-192
Lecture Notes in Computer Science > Computer and Information Sciences - ISCIS 2004 > Software Engineering and Programming Systems > 935-944
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2010 > Side-Channel Attacks and Fault Attacks > 279-296
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2008 > Implementations 2 > 331-345
Lecture Notes in Computer Science > Information Security Applications > Secure Software, Hardware, and Systems II > 227-243
Lecture Notes in Computer Science > Arithmetic of Finite Fields > Efficient Implementation and Architectures > 40-54
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2011 > FPGA Implementation > 1-16
Lecture Notes in Computer Science > Information and Communications Security > Algorithms and Implementations > 63-79
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems — CHES 2000 > Hardware Architectures > 191-203
Lecture Notes in Computer Science > Communications and Multimedia Security > Applied Cryptography > 11-21
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2006 > Efficient Hardware II > 430-444
Lecture Notes in Computer Science > Cryptology and Network Security > Wireless Network Security > 44-61
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Efficient Implementations > 418-434
Lecture Notes in Computer Science > Advances in Computer Systems Architecture > Session 4A: Application-Specific Systems > 282-295
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2004 > Implementation Aspects > 133-147
Lecture Notes in Computer Science > Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks > Performance and Security > 112-127