Search results
International Journal of Circuit Theory and Applications > 46 > 8 > 1516 - 1533
Security and Communication Networks > 9 > 18 > 4992 - 5002
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2004 > Side-Channel Attacks > 208-221
Lecture Notes in Computer Science > Theory and Applications of Models of Computation > Contributed Papers > 189-198
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems > Elliptic Curve Implementations > 316-327
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems, CHES 2010 > Efficient Implementations I > 80-94
Lecture Notes in Computer Science > Public Key Cryptography — PKC 2003 > Implementation and Hardware Issues > 240-254
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2010 > Fast Cryptographic Computation > 238-261
Lecture Notes in Computer Science > Public Key Cryptography - PKC 2006 > Number Theory Algorithms > 207-228
2015 International SoC Design Conference (ISOCC) > 265 - 266
Security and Communication Networks > 8 > 6 > 1141 - 1154