Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9--12, 2012. Proceedings
DOI10.1007/978-3-642-33027-8zbMATH Open1250.68047OpenAlexW2487822210MaRDI QIDQ450623FDOQ450623
Authors:
Publication date: 13 September 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-33027-8
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Proceedings of conferences of miscellaneous specific interest (00B25) Proceedings, conferences, collections, etc. pertaining to computer science (68-06) Proceedings, conferences, collections, etc. pertaining to information and communication theory (94-06)
Cited In (8)
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- Secure message authentication against related-key attack
- Near collision attack on the Grain v1 stream cipher
- High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers
- Masking and leakage-resilient primitives: one, the other(s) or both?
- Unknown-input attacks in the parallel setting: improving the security of the CHES 2012 leakage-resilient PRF
- On weak keys and forgery attacks against polynomial-based MAC schemes
- Efficient arithmetic in (pseudo-)Mersenne prime order fields
This page was built for publication: Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9--12, 2012. Proceedings
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q450623)