65 papers found
Refreshing results…
Distinguishing Multiplications from Squaring Operations
Download from link.springer.comEfficient Use of Random Delays in Embedded Software
Download from link.springer.comSecuring OpenSSL against Micro-Architectural Attacks.
Download from www.researchgate.netCache Based Power Analysis Attacks on AES
Download from hal-emse.ccsd.cnrs.frInhibiting Card Sharing Attacks
Download from www.researchgate.netExperimenting with Faults, Lattices and the DSA
Download from link.springer.comThe Sorcerer's Apprentice Guide to Fault Attacks
Download from citeseerx.ist.psu.eduHow to Explain Side-Channel Leakage to Your Kids
Download from www.researchgate.netMissing publications? Read more about our data sources.