|
Conferences in DBLP
(fdtc) 2007 (conf/fdtc/2007)
Securing Flash Technology. [Citation Graph (, )][DBLP]
How can we overcome both side channel analysis and fault attacks on RSA-CRT? [Citation Graph (, )][DBLP]
Montgomery Multiplication with Redundancy Check. [Citation Graph (, )][DBLP]
Fault Detection Structures for the Montgomery Multiplication over Binary Extension Fields. [Citation Graph (, )][DBLP]
A Structure-independent Approach for Fault Detection Hardware Implementations of the Advanced Encryption Standard. [Citation Graph (, )][DBLP]
A Novel Double-Data-Rate AES Architecture Resistant against Fault Injection. [Citation Graph (, )][DBLP]
DFA Mechanism on the AES Key Schedule. [Citation Graph (, )][DBLP]
Countermeasures against Branch Target Buffer Attacks. [Citation Graph (, )][DBLP]
Cheap Hardware Parallelism Implies Cheap Security. [Citation Graph (, )][DBLP]
Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis. [Citation Graph (, )][DBLP]
Tate Pairing with Strong Fault Resiliency. [Citation Graph (, )][DBLP]
Register Transfer Level Concurrent Error Detection in Elliptic Curve Crypto Implementations. [Citation Graph (, )][DBLP]
|