Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

A note on the use of margins to compare distinguishers
A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis
Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES
Addition with Blinded Operands
On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance
Common Points on Elliptic Curves: The Achille's Heel of Fault Attack Countermeasures
On Adaptive Bandwidth Selection for Efficient MIA
Generic DPA attacks: curse or blessing?
Template Attacks on Different Devices
Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis
A Multiple-Fault Injection Attack by Adaptive Timing Control under Black-Box Conditions and a Countermeasure
Adjusting laser injections for fully controlled faults.

Browse Subjects

Show more subjects...

Statistics

from
to
Export