Author:
Alawatugoda Janaka,Jayasinghe Darshana,Ragel Roshan
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Standard model leakage-resilient authenticated key exchange using inner-product extractors;Designs, Codes and Cryptography;2022-03-15
2. IoT Hardware‐Based Security: A Generalized Review of Threats and Countermeasures;Security and Privacy in the Internet of Things;2021-12-03
3. On the Randomness Timing Analysis of Timing Side Channel Attack on Key Derivation Functions;Proceedings of the 2018 VII International Conference on Network, Communication and Computing - ICNCC 2018;2018
4. On the leakage-resilient key exchange;Journal of Mathematical Cryptology;2017-12-01
5. Hardware Covert Attacks and Countermeasures;2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA);2016-03