Publisher
Springer Berlin Heidelberg
Reference34 articles.
1. Aigner, M., Burbridge, T., Ilic, A., Lyon, D., Soppera, A., Lehtonen, M.: RFID Tag Security. Building Radio Frequency IDentification for the Global Environment (BRIDGE), European Commission Contract No. IST-2005-03346, White Paper (2008)
2. Lecture Notes in Computer Science;A.A. Bogdanov,2007
3. Burke, J., McDonald, J., Austin, T.: Architectural Support for Fast Symmetric-Key Cryptography. In: ASPLOS-IX Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, Cambridge, MA, USA, November 12-15, pp. 178–189. ACM Press, New York (2000)
4. Lecture Notes in Computer Science;J.Y. Cho,2010
5. Constantin, J., Burg, A., Gürkaynak, F.K.: Investigating the Potential of Custom Instruction Set Extensions for SHA-3 Candidates on a 16-bit Microcontroller Architecture. Cryptology ePrint Archive, Report 2012/050 (2012), http://eprint.iacr.org/
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. On Analyzing Program Behavior under Fault Injection Attacks;2016 11th International Conference on Availability, Reliability and Security (ARES);2016-08