Search results for: Tetsuya Izu
IFIP — The International Federation for Information Processing > Smart Card Research and Advanced Applications VI > Side Attacks > 99-113
Lecture Notes in Computer Science > Progress in Cryptology — INDOCRYPT 2002 > Efficient and Secure Implementations > 296-313
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2002 > Elliptic Curve Cryptography I > 129-143
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2007 > Special Purpose Hardware for Cryptanalysis > 364-377
Lecture Notes in Computer Science > Information and Communications Security > Efficient Implementation of Algorithms > 217-230
IFIP — The International Federation for Information Processing > Smart Card Research and Advanced Applications VI > Side Attacks > 99-113
Lecture Notes in Computer Science > Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication > Algorithms > 116-127
Lecture Notes in Computer Science > Public Key Cryptography — PKC 2003 > Elliptic Curves:Implementation Attacks > 224-239
Lecture Notes in Computer Science > Information Security and Cryptology — ICISC 2002 > Efficient Implementations > 283-297
Lecture Notes in Computer Science > Information and Communications Security > Digital Signatures I > 72-83
Lecture Notes in Computer Science > Information Security Practice and Experience > Signatures > 51-64
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2003 > Countermeasures to Side Channel Leakage > 382-396
Lecture Notes in Computer Science > Information Security Applications > Efficient HW Implementation > 232-242
Lecture Notes in Computer Science > Information Security Applications > Privacy and Anonymity > 130-144
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Security and Privacy > 459-469