Search results for: Johannes Wolkerstorfer
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Side-Channel Attacks > 519-534
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems — CHES 2000 > Hardware Implementation of Block Ciphers > 164-174
Lecture Notes in Computer Science > Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication > Hardware Implementation > 144-159
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2002 > Finite Field and Modular Arithmetic II > 500-514
Lecture Notes in Computer Science > Selected Areas in Cryptography > Curve-Based Primitives in Hardware > 401-413
Lecture Notes in Computer Science > Advanced Encryption Standard – AES > Hardware Implementations > 98-112
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2006 > Efficient Hardware II > 430-444
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2004 > Low Resources I > 107-118
Lecture Notes in Computer Science > Field Programmable Logic and Application > Security and Cryptography 2 > 565-574
Lecture Notes in Computer Science > Data Privacy Management and Autonomous Spontaneous Security > Data Privacy Management > 51-63
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2007 > High Speed AES Implementations > 227-238
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2002 > Efficient Hardware Implementations > 67-78
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2004 > Low Resources II > 357-370
RFID Security > Encryption and Hardware Implementations > 373-415