Publisher
Springer Berlin Heidelberg
Reference2 articles.
1. Rivest, R., Shamir, A., and Adleman, L. A Method for Obtaining Digital Signatures and Public-Key Crypotsystems. Communications of the ACM, vol. 21, issue 2, Feb. 1978, pp. 120–126.
2. Kocher, P. Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using Timing Attacks. Private Extended Abstract, 7 December 1995.
Cited by
77 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. ROPfuscator: Robust Obfuscation with ROP;2023 IEEE Security and Privacy Workshops (SPW);2023-05
2. Integration of fault-tolerant feature to OMIEEPB routing protocol in wireless sensor network;International Journal of Intelligent Computing and Cybernetics;2021-12-13
3. Cyber-Physical System and Internet of Things Security;Research Anthology on Combating Denial-of-Service Attacks;2021
4. Bibliography;Security Engineering;2020-12-02
5. Developing Anti-tamper Functionalities through Continuous Integration;Proceedings of the 2020 5th International Conference on Intelligent Information Technology;2020-02-19