Publisher
Springer Berlin Heidelberg
Reference2 articles.
1. Rivest, R., Shamir, A., and Adleman, L. A Method for Obtaining Digital Signatures and Public-Key Crypotsystems. Communications of the ACM, vol. 21, issue 2, Feb. 1978, pp. 120–126.
2. Kocher, P. Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using Timing Attacks. Private Extended Abstract, 7 December 1995.
Cited by
78 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The Instruction Separation Framework against Man-At-The-End Attacks: Protect What is Mattered On-the-Fly;2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom);2023-12-21
2. ROPfuscator: Robust Obfuscation with ROP;2023 IEEE Security and Privacy Workshops (SPW);2023-05
3. Integration of fault-tolerant feature to OMIEEPB routing protocol in wireless sensor network;International Journal of Intelligent Computing and Cybernetics;2021-12-13
4. Cyber-Physical System and Internet of Things Security;Research Anthology on Combating Denial-of-Service Attacks;2021
5. Bibliography;Security Engineering;2020-12-02