Author:
Armknecht Frederik,Maes Roel,Sadeghi Ahmad-Reza,Sunar Berk,Tuyls Pim
Publisher
Springer Berlin Heidelberg
Reference49 articles.
1. Lecture Notes in Computer Science;D. Agrawal,2003
2. Lecture Notes in Computer Science;A. Akavia,2009
3. Anderson, R.J., Kuhn, M.G.: Low cost attacks on tamper resistant devices. In: Proceedings of the 5th International Workshop on Security Protocols, London, UK, pp. 125–136. Springer, Heidelberg (1998)
4. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: FOCS 1997: Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS 1997), Washington, DC, USA, p. 394. IEEE Computer Society, Los Alamitos (1997)
5. Lecture Notes in Computer Science;M. Bellare,1994
Cited by
51 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献