Author:
Matyas S. M.,Le A. V.,Abraham D. G.
Subject
Computational Theory and Mathematics,Computer Graphics and Computer-Aided Design,Information Systems,General Computer Science,Theoretical Computer Science,Software
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Hash Functions and Their Applications;Algorithmic Strategies for Solving Complex Problems in Cryptography;2018
2. References;Applied Cryptography, Second Edition;2015-10-09
3. Cryptographic Processors-A Survey;Proceedings of the IEEE;2006-02
4. API-level attacks on embedded systems;Computer;2001
5. Attacks on Cryptoprocessor Transaction Sets;Cryptographic Hardware and Embedded Systems — CHES 2001;2001