Search results for: Colin D. Walter
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2001 > Flaws and Attacks > 192-207
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2004 > Side-Channel Attacks > 208-221
Lecture Notes in Computer Science > Cryptography and Coding > Side Channels and Implementations > 446-468
Lecture Notes in Computer Science > Information Security Applications > Smart Cards/Secure Systems > 303-316
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2002 > Efficient Hardware Implementations > 53-66
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2008 > Side-Channel Analysis 2 > 214-227
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems — CHES 2000 > Hardware Architectures > 204-215
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2004 > Side Channels II > 191-204
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2002 > Efficient Hardware Implementations > 30-39
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO ’91 > Applications and Implementations > 313-323
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2002 > Finite Field and Modular Arithmetic II > 276-290
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems > Invited Talk > 80-93
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2003 > Implementation Issues > 391-402