Search results
Journal of Medical Systems > 2019 > 43 > 8 > 1-10
IEEE Transactions on Computer-Aided Design of Integrated Circuits and... > 2018 > 37 > 1 > 110 - 122
IEEE Transactions on Very Large Scale Integration (VLSI) Systems > 2017 > 25 > 12 > 3291 - 3301
IEEE Transactions on Very Large Scale Integration (VLSI) Systems > 2017 > 25 > 2 > 608 - 620
IFIP — The International Federation for Information Processing > Smart Card Research and Advanced Applications VI > Side Attacks > 127-142
IEEE Transactions on Circuits and Systems I: Regular Papers > 2016 > 63 > 7 > 1033 - 1042
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2002 > Elliptic Curve Cryptography I > 129-143
Lecture Notes in Computer Science > Information Security and Privacy > Hashing and Message Authentication > 432-443
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2004 > Side-Channel Attacks > 222-235
Lecture Notes in Computer Science > Public Key Cryptography — PKC 2003 > Elliptic Curves:Implementation Attacks > 199-211
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2004 > PKI and Related Implementation > 154-167
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems — CHES 2001 > Side Channel Attacks on Elliptic Curve Cryptosystems > 377-390
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2005 > Hardware Attacks and Countermeasures II > 354-365
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2003 > Countermeasures to Side Channel Leakage > 382-396
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2003 > Hyperelliptic Curve Cryptography > 366-381