Found: 8
Select item for more details and to access through your institution.
Design Methodology and Validity Verification for a Reactive Countermeasure Against EM Attacks.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 2, p. 373, doi. 10.1007/s00145-015-9223-3
- By:
- Publication type:
- Article
Acoustic Cryptanalysis.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 2, p. 392, doi. 10.1007/s00145-015-9224-2
- By:
- Publication type:
- Article
Secret-Sharing for NP.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 2, p. 444, doi. 10.1007/s00145-015-9226-0
- By:
- Publication type:
- Article
Security of Blind Signatures Revisited.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 2, p. 470, doi. 10.1007/s00145-015-9225-1
- By:
- Publication type:
- Article
The Security of Tandem-DM in the Ideal Cipher Model.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 2, p. 495, doi. 10.1007/s00145-016-9230-z
- By:
- Publication type:
- Article
Efficient Cryptosystems From $$\mathbf{2}^{{\varvec{k}}}$$ -th Power Residue Symbols.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 2, p. 519, doi. 10.1007/s00145-016-9229-5
- By:
- Publication type:
- Article
Photonic Side-Channel Analysis of Arbiter PUFs.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 2, p. 550, doi. 10.1007/s00145-016-9228-6
- By:
- Publication type:
- Article
Jacobian Coordinates on Genus 2 Curves.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 2, p. 572, doi. 10.1007/s00145-016-9227-7
- By:
- Publication type:
- Article