Search

Your search keyword '"Ege B"' showing total 36 results

Search Constraints

Start Over You searched for: Author "Ege B" Remove constraint Author: "Ege B" Database OAIster Remove constraint Database: OAIster
36 results on '"Ege B"'

Search Results

1. Physical Security Analysis of Embedded Devices

2. Physical Security Analysis of Embedded Devices

3. Physical Security Analysis of Embedded Devices

5. Improving DPA resistance of S-boxes: How far can we go?

6. Challenges in designing trustworthy cryptographic co-processors

7. Improving DPA resistance of S-boxes: How far can we go?

8. Improving DPA resistance of S-boxes: How far can we go?

9. Challenges in designing trustworthy cryptographic co-processors

10. Challenges in designing trustworthy cryptographic co-processors

11. Improving DPA resistance of S-boxes: How far can we go?

14. Clock Glitch Attacks in the Presence of Heating

15. Optimality and beyond: The case of 4×4 S-boxes

16. S-box, SET, Match: A Toolbox for S-box Analysis

19. Clock Glitch Attacks in the Presence of Heating

20. Optimality and beyond: The case of 4×4 S-boxes

21. S-box, SET, Match: A Toolbox for S-box Analysis

23. S-box, SET, Match: A Toolbox for S-box Analysis

26. Clock Glitch Attacks in the Presence of Heating

27. Optimality and beyond: The case of 4×4 S-boxes

31. Security of countermeasures against state-of-the-art differential scan attacks

34. Security of countermeasures against state-of-the-art differential scan attacks

35. Security of countermeasures against state-of-the-art differential scan attacks

Catalog

Books, media, physical & digital resources