Author:
Trichina Elena,Korkishko Tymur
Publisher
Springer Berlin Heidelberg
Reference32 articles.
1. Lecture Notes in Computer Science;M. Akkar,2001
2. Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: Proc. Security Protocols: IWSP 1997. LNCS, vol. 1361, pp. 125–136 (1997)
3. Blömmer, J., Merchan, J.G., Krummel, V.: Provably secure masking of AES. IACR Cryptology ePrint Archive Report 2004/101 (2004)
4. Bucci, M., Germani, L., Guglielmo, M., Luzzi, R., Trifiletti, A.: A simulation methodology for DPA resistance testing of cryptographic processors (manuscript, 2003)
5. Lecture Notes in Computer Science;S. Chari,1999
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献