Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Article
|
![]() |
Study of Single-Event Transients in High-Speed Operational AmplifiersJaulent, P. ; Pouget, V. ; Lewis, D. ; Fouillat, P.IEEE transactions on nuclear science, 2008-08, Vol.55 (4), p.1974-1981 [Peer Reviewed Journal]New York: IEEEFull text available |
2 |
Material Type: Article
|
![]() |
Vulnerability modeling of cryptographic hardware to power analysis attacksMoradi, Amir ; Salmasizadeh, Mahmoud ; Manzuri Shalmani, Mohammad Taghi ; Eisenbarth, ThomasIntegration (Amsterdam), 2009-09, Vol.42 (4), p.468-478 [Peer Reviewed Journal]Amsterdam: Elsevier B.VFull text available |
3 |
Material Type: Article
|
![]() |
Generalized Scalar Multiplication Secure against SPA, DPA, and RPAMIYAJI, AtsukoIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2008/10/01, Vol.E91.A(10), pp.2833-2842 [Peer Reviewed Journal]The Institute of Electronics, Information and Communication EngineersFull text available |
4 |
Material Type: Article
|
![]() |
Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPAMAMIYA, H.IEICE transactions on fundamentals of electronics, communications and computer sciences, 2006-08, Vol.E89-A (8), p.2207-2215 [Peer Reviewed Journal]Full text available |
5 |
Material Type: Conference Proceeding
|
![]() |
A hot swap detection method for ORU modules of spacecraftYaxing, Cai ; Tao, Wang ; Pingxin, Ma2019 14th IEEE International Conference on Electronic Measurement & Instruments (ICEMI), 2019, p.1350-1356IEEENo full-text |
6 |
Material Type: Article
|
![]() |
Enhanced Exhaustive Search Attack on Randomized BSD Type CountermeasureHAN, D.-G.IEICE transactions on fundamentals of electronics, communications and computer sciences, 2006-05, Vol.E89-A (5), p.1316-1327 [Peer Reviewed Journal]Full text available |
7 |
Material Type: Article
|
![]() |
Cryptanalysis of Ha-Moon's Countermeasure of Randomized Signed Scalar MultiplicationOKEYA, K.IEICE transactions on fundamentals of electronics, communications and computer sciences, 2005-05, Vol.E88-A (5), p.1140-1147 [Peer Reviewed Journal]Full text available |
8 |
Material Type: Article
|
![]() |
An SPA-Based Extension of Schindler's Timing Attack against RSA Using CRTTOMOEDA, Y.IEICE transactions on fundamentals of electronics, communications and computer sciences, 2005-01, Vol.E88-A (1), p.147-153 [Peer Reviewed Journal]Full text available |
9 |
Material Type: Article
|
![]() |
Side Channel Cryptanalysis on XTR Public Key CryptosystemHAN, D.-G.IEICE transactions on fundamentals of electronics, communications and computer sciences, 2005-05, Vol.E88-A (5), p.1214-1223 [Peer Reviewed Journal]Full text available |
10 |
Material Type: Conference Proceeding
|
![]() |
An Efficient Algorithm for DPA-resistent RSAWang, Yi ; Leiwo, Jussipekka ; Srikanthan, Thambipillai ; Jianwen, LuoAPCCAS 2006 - 2006 IEEE Asia Pacific Conference on Circuits and Systems, 2006, p.1659-1662IEEEFull text available |