Author:
Biehl Ingrid,Meyer Bernd,Müller Volker
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. R. J. Anderson and M. G. Kuhn: Tamper Resistance-a Cautionary Note, Pro ceedings of Second USENIX Workshop on Electronic Commerce 1996, pp. 1–11.
2. Lect Notes Comput Sci;R. J. Anderson,1997
3. E. Biham and A. Shamir: Differential Fault Analysis of Secret Key Cryptosystems, Lecture Notes of Computer Science 1294, Proceedings of CRYPTO’97, Springer, pp. 513–525.
4. D. Boneh, R. A. DeMillo, and R. J. Lipton: On the Importance of Checking Cryptographic Protocols for Faults, Lecture Notes of Computer Science 1233, Proceedings of EUROCRYPT’97, Springer, pp. 37–51.
5. M. Burmester: A Remark on the Efficiency of Identification Schemes, Lecture Notes of Computer Science 473, Proceedings of EUROCRYPT’90, Springer, pp. 493–495.
Cited by
130 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献