History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 | next | last

Result 1 to 7 of 7 total

All-or-Nothing Transforms as a countermeasure to differential side-channel analysis. (English)
Int. J. Inf. Sec.Int. J. Inf. Sec. 13, N0. 3, 291-304(2014)
WorldCat.org
1
The Effects of Lossy Compression on Diagnostically Relevant Seizure Information in EEG Signals. (English)
IEEE J. Biomedical and Health InformaticsIEEE J. Biomedical and Health Informatics 17, N0. 1, 121-127(2013)
WorldCat.org
2
First-order side-channel attacks on the permutation tables countermeasure. (English)
Clavier, Christophe (ed.) et al., Cryptographic hardware and embedded systems ‒ CHES 2009. 11th international workshop Lausanne, Switzerland, September 6‒9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04137-2/pbk). Lecture Notes in Computer Science 5747, 81-96 (2009).
WorldCat.org
3
FPGA Implementations of SHA-3 Candidates: CubeHash, Grostl, LANE, Shabal and Spectral Hash. (English)
DSD, 783-790(2009)
WorldCat.org
4
Differential power analysis of HMAC based on SHA-2, and countermeasures. (English)
Kim, Sehun (ed.) et al., Information security applications. 8th international workshop, WISA 2007, Jeju Island, Korea, August 27‒29, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-77534-8/pbk). Lecture Notes in Computer Science 4867, 317-332 (2008).
WorldCat.org
5
Optimisation of the SHA-2 Family of Hash Functions on FPGAs. (English)
ISVLSI, 317-322(2006)
WorldCat.org
6
Efficient All-or-Nothing Encryption Using CTR Mode. (English)
SECRYPT, 237-245(2006)
WorldCat.org
7
first | previous | 1 | next | last

Result 1 to 7 of 7 total

Valid XHTML 1.0 Transitional Valid CSS!