Publisher
Springer International Publishing
Reference34 articles.
1. Alwen, J., Dodis, Y., Wichs, D.: Leakage-resilient public-key cryptography in the bounded-retrieval model. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 36–54. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03356-8_3
2. Apple: Apple Platform Security Spring 2020 (2020). https://manuals.info.apple.com/MANUALS/1000/MA1902/en_US/apple-platform-security-guide.pdf
3. Brakerski, Z., Kalai, Y.T., Katz, J., Vaikuntanathan, V.: Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage. In: 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, pp. 501–510 (2010). https://doi.org/10.1109/FOCS.2010.55
4. Butun, I., Sari, A., Österberg, P.: Hardware security of fog end-devices for the internet of things. Sensors 20, 5729 (2020)
5. Lecture Notes in Computer Science;J Camenisch,2009