Search results for: Michael Hutter
FEBS Letters > 596 > 24 > 3133 - 3144
European Journal of Organic Chemistry > 2020 > 36 > 5833 - 5840
Journal of Cryptology > 2018 > 31 > 4 > 1164-1182
Journal of Cryptographic Engineering > 2019 > 9 > 2 > 173-184
Lecture Notes in Computer Science > Smart Card Research and Advanced Application > Side Channel Analysis > 36-48
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Side-Channel Attacks > 519-534
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2011 > Public-Key Cryptosystems > 459-474
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2008 > Fault Analysis 2 > 363-379
Lecture Notes in Computer Science > Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication > Hardware Implementation > 144-159
Lecture Notes in Computer Science > Radio Frequency Identification: Security and Privacy Issues > Session 4 > 189-202
Lecture Notes in Computer Science > Information Security Applications > Side Channel Attacks > 163-177
Lecture Notes in Computer Science > Smart Card Research and Advanced Applications > Implementations and Hardware Security 1 > 182-198
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2011 > Efficient Implementations > 170-187
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2007 > Security Issues for RF and RFID > 320-333
Soziologie des Cyberspace > Recht und Verfahren > 522-537
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 2 > 266 - 277
The FEBS Journal > 282 > 1 > 74 - 88
Journal of Cryptographic Engineering > 2015 > 5 > 3 > 201-214