1. Authenticated encryption: relations among notions and analysis of the generic composition paradigm;Bellare;J. Cryptol.,2008
2. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract);Boneh,1997
3. Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems;Kocher,1996
4. Probing attacks on tamper-resistant devices;Handschuh,1999
5. Fault induction attacks, tamper resistance, and hostile reverse engineering in perspective, in: Financial Cryptography, First International Conference, FC ’97, Anguilla, British West Indies, February 24–28, 1997;Maher,1997