Author:
Shang D.,Burns F.,Bystrov A.,Koelmans A.,Sokolov D.,Yakovlev A.
Publisher
Institution of Engineering and Technology (IET)
Subject
Computational Theory and Mathematics,Hardware and Architecture,Theoretical Computer Science
Reference16 articles.
1. Daemen, J., and Rijmen, V.: ‘The design of Rijndael’, Information Security and Cryptography Series, (Springer-Verlag 2002)
2. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
3. Hess, E., Jansen, N., Meyer, B., and Schutze, T.: ‘Information leakage attacks against smart card implementations of cryptographic algorithms and countermeasures: a survey’, http://www.math.tu-dresden.de/~schuetze/reports/leakage.pdf
4. Kocher, P., Jaffe, J., and Jun, B.: ‘Differential power analysis’, Advances in Cryptology – Crypto '99, LNCS 1666, (Springer Verlag 1999 August), p. 388–397
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献