Author:
Das Amitabh,Da Rolt Jean,Ghosh Santosh,Seys Stefaan,Dupuis Sophie,Di Natale Giorgio,Flottes Marie-Lise,Rouzeyre Bruno,Verbauwhede Ingrid
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference32 articles.
1. Batina L, Guajardo J, Kerins T, Mentens N, Tuyls P, Verbauwhede I (2006) An Elliptic Curve Processor Suitable For RFID-Tags. IACR Cryptology ePrint Archive
2. Batina L, Guajardo J, Kerins T, Mentens N, Tuyls P and Verbauwhede I (2006) Public-Key Cryptography for RFID-Tags. Workshop on RFID Security, pp. 61–76
3. Becher A, Benenson Z and Dornseif M (2006) Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. SPC 2006, LNCS 3934, pp. 104–118
4. Bernstein DJ and Lange T (2007) Faster addition and doubling on elliptic curves. ASIACRYPT 2007. LNCS 4833, pp. 29–50, Springer
5. Buskey RF and Frosik BB. Protected JTAG, Proceedings of the 2006 International Conference on Parallel Processing Workshops (ICPPW’06), 0-7695-2637-3/06
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献