Author:
Ahuja Harjis,Bapna Ruchita,Bhase Gargee,Shekokar Narendra
Publisher
Springer Nature Singapore
Reference6 articles.
1. Shamir A, Tromer E, Genkin D (214) RSA key extraction via low bandwidth acoustic cryptanalysis, Advances in Cryptology CRYPTO 2014 Lecture Notes in Computer Science, pp 444–461
2. Leroux P-A, Willems J-L, Mestr P, Quisquater J-J, Dhem J-F, Koeune F (200) A practical ımplementation of the timing attack, Lecture Notes in Computer Science Smart Card Research and Applications, pp 167–182
3. Schindler W (2000) A timing attack against RSA with the Chinese remainder theorem, Cryptographic Hardware and Embedded Systems CHES 2000 Lecture Notes in Computer Science, pp 109–124 (2000)
4. Satheesh M, Deepika M (2020) Implementation of multifactor authentication using optimistic fair exchange. J Ubiquitous Comput Commun Technol (UCCT) 2(02):70–78
5. Doraipandian M, Rajendran S (2021)Design of medical ımage cryptosystem triggered by fusional chaotic map. In: Intelligent data communication technologies and ınternet of things: proceedings of ICICI 2020, pp 395–409