Wyniki wyszukiwania dla: Ingrid Verbauwhede
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2009 > New Ciphers and Efficient Implementations > 289-303
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2008 > Side Channel Attack > 253-267
Lecture Notes in Computer Science > Reconfigurable Computing: Architectures and Applications > Security > 323-334
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2009 > TRNGs and Device Identification > 332-347
Lecture Notes in Computer Science > Topics in Cryptology - CT-RSA 2010 > Side-Channel Attacks > 221-234
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2005 > Low Resources > 106-118
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems — CHES 2001 > Rijndael Hardware Implementations > 51-64
Lecture Notes in Computer Science
The Internet of Things > Security and Privacy Issues > 397-407
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Mobile Lightweight Wireless Systems > MobiLight 2010 – Special Session on “Security and Resilience in the Future Internet (SECURE)” > 254-267
Handbook of Signal Processing Systems > Applications Managing Editor: Shuvra Bhattacharyya > 161-177
Information Security and Cryptography > Towards Hardware-Intrinsic Security > Hardware-Security in Contactless Tokens > 237-257
Information Security and Cryptography > Towards Hardware-Intrinsic Security > Physically Unclonable Functions (PUFs) > 3-37
IFIP — The International Federation for Information Processing > Smart Card Research and Advanced Applications VI > Fault Injection Attacks > 143-158
Ultra Low-Power Electronics and Design > 141-155
Journal of Cryptographic Engineering > 2016 > 6 > 2 > 139-153