|
Search the dblp DataBase
Martin Feldhofer:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer
Strong Authentication for RFID Systems Using the AES Algorithm. [Citation Graph (0, 0)][DBLP] CHES, 2004, pp:357-370 [Conf]
- Martin Feldhofer, Thomas Trathnigg, Bernd Schnitzer
A Self-Timed Arithmetic Unit for Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP] DSD, 2002, pp:347-350 [Conf]
- Martin Feldhofer, Christian Rechberger
A Case Against Currently Used Hash Functions in RFID Protocols. [Citation Graph (0, 0)][DBLP] OTM Workshops (1), 2006, pp:372-381 [Conf]
- Stefan Tillich, Martin Feldhofer, Johann Großschädl
Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box. [Citation Graph (0, 0)][DBLP] SAMOS, 2006, pp:457-466 [Conf]
- Michael Hutter, Stefan Mangard, Martin Feldhofer
Power and EM Attacks on Passive 13.56 MHz RFID Devices. [Citation Graph (0, 0)][DBLP] CHES, 2007, pp:320-333 [Conf]
- Martin Feldhofer, Johannes Wolkerstorfer
Strong Crypto for RFID Tags - A Comparison of Low-Power Hardware Implementations. [Citation Graph (0, 0)][DBLP] ISCAS, 2007, pp:1839-1842 [Conf]
A System of Secure Virtual Coupons Using NFC Technology. [Citation Graph (, )][DBLP]
On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices. [Citation Graph (, )][DBLP]
A low-resource public-key identification scheme for RFID tags and sensor nodes. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|