×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [channel attacks]
Security Enabled Near Field Communication
110 views
Defcon - Advanced Hardware Hacking Techniques (Ppt) - 20p
85 views
Side-Channel Attacks on RSA with CRT Weakness of RSA Alexander Kozak Jared Vanderbeck
237 views
European Consumer Summit 2014 On-line and mobile payments Dr Florent Frederix Trust & Security Unit, DG CONNECT, European Commission 1 th of April 2014
218 views
A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over GF(p ) Yuan Ma, Zongbin Liu, Wuqiong Pan, Jiwu Jing State Key Laboratory of
224 views
High Performance Embedded Computing © 2007 Elsevier Lecture 8: Embedded Processor Issues Embedded Computing Systems Mikko Lipasti, adapted from M. Schulte
227 views
High Performance Embedded Computing © 2007 Elsevier Chapter 2, part 3: CPUs High Performance Embedded Computing Wayne Wolf
219 views
On Timing and Teaching marco slaviero SensePost 2009
215 views
Protecting Circuits from Leakage Sebastian Faust @ Rome La Sapienza, January 18, 2009 Joint work with KU Leuven Tal Rabin Leo Reyzin Eran Tromer Vinod
216 views
© Lourdes López Santidrián1 Ubiquitous and Secure Networks and Services: Ubiquitous Systems Security Ubiquitous and Secure Networks and Services Redes
215 views
U n u s u a l Side Channel Countermeasure Ideas (that lend themselves to some form of provability)
216 views
Master track Computer security: studying at the Kerckhoffs Institute Lejla Batina Digital Security Group Institute for Computing and Information Sciences
227 views
Next >