Search results for: Kerstin Lemke
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2007 > Differential and Higher Order Attacks > 14-27
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2005 > Side Channels I > 30-46
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2002 > RSA Implementation > 228-243
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Security of Limited Devices > 253-267
Lecture Notes in Computer Science > Information Security Applications > Internet and Wireless Security > 391-404
Lecture Notes in Computer Science > Smart Card Research and Advanced Applications > Non-invasive Attacks > 252-265
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2004 > Side Channels II > 205-219
Lecture Notes in Computer Science > Computer Security – ESORICS 2007 > Security Architecture and Secure Components II > 454-468
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2009 > Side Channel Analysis of Secret Key Cryptosystems > 112-127
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2006 > Side Channels I > 15-29
Lecture Notes in Computer Science > Information Security Practice and Experience > Applications and Case Studies > 230-242
Lecture Notes in Computer Science > Fault Diagnosis and Tolerance in Cryptography > Models for Fault Attacks on Cryptographic Devices > 131-143
Transportation Research Procedia > 2016 > 15 > C > 26-35
Transportation Research Procedia > 2016 > 15 > C > 366-377