Search results for: Ingrid Verbauwhede
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2003 > Secure Hardware Logic > 125-136
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2009 > Pairing-Based Cryptography > 240-253
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT’ 87 > Symmetric Ciphers: Application > 287-300
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2008 > Fault Analysis 2 > 346-362
Lecture Notes in Computer Science > Arithmetic of Finite Fields > Functions, Equations and Modular Multiplication > 166-179
Lecture Notes in Computer Science > Selected Areas in Cryptography > Curve-Based Primitives in Hardware > 387-400
IFIP — The International Federation for Information Processing > Smart Card Research and Advanced Applications VI > Fault Injection Attacks > 143-158
Lecture Notes in Computer Science > Security and Privacy in Ad-Hoc and Sensor Networks > Regular Papers > 6-17
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2011 > Public-Key Cryptosystems > 421-441
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2011 > Lightweight Symmetric Algorithms > 312-325
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2005 > Hardware Attacks and Countermeasures II > 354-365
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2005 > Efficient and Secure Implementation > 323-333
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2008 > Side Channel Cryptanalysis > 274-287
Lecture Notes in Computer Science > Field Programmable Logic and Application > Debugging and Test > 1052-1056