Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
41 |
Material Type: Ata de Congresso
|
On Using RSA/ECC Coprocessor for Ideal Lattice-Based Key ExchangeGreuet, Aurélien ; Montoya, Simon ; Renault, GuénaëlConstructive Side-Channel Analysis and Secure Design, p.205-227 [Periódico revisado por pares]Cham: Springer International PublishingSem texto completo |
|
42 |
Material Type: Ata de Congresso
|
Protecting Secure ICs Against Side-Channel Attacks by Identifying and Quantifying Potential EM and Leakage Hotspots at Simulation StagePoggi, Davide ; Maurine, Philippe ; Ordas, Thomas ; Sarafianos, AlexandreConstructive Side-Channel Analysis and Secure Design, p.129-147 [Periódico revisado por pares]Cham: Springer International PublishingSem texto completo |
|
43 |
Material Type: Artigo
|
Autologous intravenous mononuclear stem cell therapy in chronic ischemic strokeBhasin, A ; Srivastava, Mv ; Bhatia, R ; Mohanty, S ; Kumaran, Ss ; Bose, SJournal of stem cells & regenerative medicine, 2012-01, Vol.8 (3), p.181-189India: Journal of Stem Cells and Regenerative MedicineTexto completo disponível |
|
44 |
Material Type: Ata de Congresso
|
White-Box ECDSA: Challenges and Existing SolutionsDottax, Emmanuelle ; Giraud, Christophe ; Houzelot, AgatheConstructive Side-Channel Analysis and Secure Design, p.184-201 [Periódico revisado por pares]Cham: Springer International PublishingSem texto completo |
|
45 |
Material Type: Ata de Congresso
|
Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to ISAPUdvarhelyi, Balazs ; Bronchain, Olivier ; Standaert, François-XavierConstructive Side-Channel Analysis and Secure Design, p.168-183 [Periódico revisado por pares]Cham: Springer International PublishingSem texto completo |
|
46 |
Material Type: Ata de Congresso
|
First Full-Fledged Side Channel Attack on HMAC-SHA-2Belenky, Yaacov ; Dushar, Ira ; Teper, Valery ; Chernyshchyk, Hennadii ; Azriel, Leonid ; Kreimer, YuryConstructive Side-Channel Analysis and Secure Design, p.31-52 [Periódico revisado por pares]Cham: Springer International PublishingSem texto completo |
|
47 |
Material Type: Ata de Congresso
|
Generalizing Statistical Ineffective Fault Attacks in the Spirit of Side-Channel AttacksBarbu, Guillaume ; Castelnovi, Laurent ; Chabrier, ThomasConstructive Side-Channel Analysis and Secure Design, p.105-125 [Periódico revisado por pares]Cham: Springer International PublishingSem texto completo |
|
48 |
Material Type: Capítulo de Livro
|
Revisiting the Security of LPN Based RFID Authentication Protocol and Potential Exploits in Hardware ImplementationsBhasin, Shivam ; Mendelson, Avi ; Nandi, MridulSecurity, Privacy, and Applied Cryptography Engineering, 2019, Vol.11947, p.214-230 [Periódico revisado por pares]Switzerland: Springer International Publishing AGSem texto completo |
|
49 |
Material Type: Ata de Congresso
|
Transform Without Encode is not Sufficient for SIFA and FTA Security: A Case StudySaha, Sayandeep ; Mukhopadhyay, DebdeepConstructive Side-Channel Analysis and Secure Design, p.85-104 [Periódico revisado por pares]Cham: Springer International PublishingSem texto completo |
|
50 |
Material Type: Ata de Congresso
|
Low-Latency Hardware Masking of PRINCEMüller, Nicolai ; Moos, Thorben ; Moradi, AmirConstructive Side-Channel Analysis and Secure Design, p.148-167 [Periódico revisado por pares]Cham: Springer International PublishingSem texto completo |