Security evaluations beyond computing power. How to analyze side-channel attacks you cannot mount? (Q4924407)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Security evaluations beyond computing power. How to analyze side-channel attacks you cannot mount? |
scientific article; zbMATH DE number 6169219
| Language | Label | Description | Also known as |
|---|---|---|---|
| default for all languages | No label defined |
||
| English | Security evaluations beyond computing power. How to analyze side-channel attacks you cannot mount? |
scientific article; zbMATH DE number 6169219 |
Statements
Security Evaluations beyond Computing Power (English)
0 references
31 May 2013
0 references
0.8471276164054871
0 references
0.8264567255973816
0 references
0.8060710430145264
0 references
0.8022193908691406
0 references
0.7926515340805054
0 references