Publisher
Springer International Publishing
Reference14 articles.
1. Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)Possibility of Obfuscating Programs. J. ACM 6, 6:1–6:48 (2012)
2. Bilgin, B., Daemen, J., Nikov, V., Nikova, S., Rijmen, V., Assche, G.V.: Efficient and first-order DPA resistant implementations of keccak. In: Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27–29, Revised Selected Papers, pp. 187–199 (2013)
3. Lecture Notes in Computer Science;B. Bilgin,2014
4. Lecture Notes in Computer Science;B. Bilgin,2012
5. Instruments, T.: FRAM FAQs (2014) (accessed February 10, 2015)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Design and Implementation of a Secure RISC-V Microprocessor;IEEE Transactions on Very Large Scale Integration (VLSI) Systems;2022-11
2. Optimal First-Order Boolean Masking for Embedded IoT Devices;Smart Card Research and Advanced Applications;2018
3. Concealing Secrets in Embedded Processors Designs;Smart Card Research and Advanced Applications;2017