Search results
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems — CHES 2000 > Power and Timing Analysis Attacks > 109-124
Lecture Notes in Computer Science > Parallel Processing and Applied Mathematics > The Second Minisymposium on Cell/B.E. Technologies > 477-485
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2004 > Modular Multiplication > 45-61
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2004 > Public Key Cryptanalysis > 290-304
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems — CHES 2001 > Hardware Implementations of Ciphers > 364-376
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems — CHES 2000 > Hardware Architectures > 204-215
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Cryptanalysis > 319-330
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2008 > Side Channel Cryptanalysis > 256-273
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2002 > Efficient Hardware Implementations > 40-52
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2006 > Efficient Implementation and Hardware > 81-93
Lecture Notes in Computer Science > Security in Pervasive Computing > Hardware Architectures > 253-270
Lecture Notes in Computer Science > Public Key Cryptography – PKC 2008 > Session V: Implementation of Fast Arithmetic > 214-228
Lecture Notes in Computer Science > Selected Areas in Cryptography > Mathematical Aspects of Applied Cryptography II > 361-372
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2007 > Side-Channel Attacks (I) > 225-242
Communications in Computer and Information Science > Advances in Network Security and Applications > Network Security and Applications > 320-330
Integration, the VLSI Journal > 2016 > 52 > Complete > 142-155
Procedia Technology > 2016 > 24 > C > 911-917
Computers & Security > 2015 > 52 > C > 276-291
2015 IEEE 22nd Symposium on Computer Arithmetic > 144 - 151