Pages that link to "Item:Q2890009"
From MaRDI portal
The following pages link to Localized Electromagnetic Analysis of Cryptographic Implementations (Q2890009):
Displaying 5 items.
- Attacking embedded ECC implementations through CMOV side channels (Q1698620) (← links)
- Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices (Q2152167) (← links)
- Speeding up regular elliptic curve scalar multiplication without precomputation (Q2210646) (← links)
- On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages (Q2946470) (← links)
- Key Bit-Dependent Attack on Protected PKC Using a Single Trace (Q5056016) (← links)