From post

A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack.

, , , и . ICISC, том 2288 из Lecture Notes in Computer Science, стр. 414-427. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multi-exponentiation algorithm based on binary GCD computation and its application to side-channel countermeasure., , и . J. Cryptographic Engineering, 2 (2): 99-110 (2012)A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications., , , и . ICISC, том 1787 из Lecture Notes in Computer Science, стр. 156-168. Springer, (1999)Hardware Fault Attackon RSA with CRT Revisited., , и . ICISC, том 2587 из Lecture Notes in Computer Science, стр. 374-388. Springer, (2002)Efficient Distributed Signcryption Scheme as Group Signcryption., и . ACNS, том 2846 из Lecture Notes in Computer Science, стр. 403-417. Springer, (2003)Asymmetric Key Pre-distribution Scheme for sensor networks., , , и . IEEE Trans. Wirel. Commun., 8 (3): 1366-1372 (2009)Keying Material Based Key Pre-distribution Scheme for Sensor Networks., , , и . Ad Hoc Sens. Wirel. Networks, 6 (1-2): 67-89 (2008)Keying material based key pre-distribution scheme., , , и . ISI, стр. 218-221. IEEE, (2008)Cryptanalysis on the Robust and Simple Authentication Protocol for Secure Communication on the Web., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 89-A (6): 1859-1862 (2006)An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing., , и . Int. J. Netw. Secur., 11 (1): 17-22 (2010)Secure Message Distribution Scheme with Configurable Privacy in Heterogeneous Wireless Sensor Networks., , и . IEICE Trans. Inf. Syst., 93-D (3): 484-490 (2010)