Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9--12, 2012. Proceedings
DOI10.1007/978-3-642-33027-8zbMATH Open1250.68047OpenAlexW2487822210MaRDI QIDQ450623FDOQ450623
Authors:
Publication date: 13 September 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-33027-8
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Proceedings of conferences of miscellaneous specific interest (00B25) Proceedings, conferences, collections, etc. pertaining to computer science (68-06) Proceedings, conferences, collections, etc. pertaining to information and communication theory (94-06)
Cited In (8)
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes
- Secure Message Authentication Against Related-Key Attack
- Near Collision Attack on the Grain v1 Stream Cipher
- Masking and leakage-resilient primitives: one, the other(s) or both?
- High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers
- Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF
- Efficient arithmetic in (pseudo-)Mersenne prime order fields
This page was built for publication: Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9--12, 2012. Proceedings
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q450623)