𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Vulnerability modeling of cryptographic hardware to power analysis attacks

✍ Scribed by Amir Moradi; Mahmoud Salmasizadeh; Mohammad Taghi Manzuri Shalmani; Thomas Eisenbarth


Book ID
108298645
Publisher
Elsevier Science
Year
2009
Tongue
English
Weight
649 KB
Volume
42
Category
Article
ISSN
0167-9260

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Vulnerability of interconnected power sy
✍ Ettore Bompard; Roberto Napoli; Fei Xue πŸ“‚ Article πŸ“… 2008 πŸ› John Wiley and Sons 🌐 English βš– 255 KB

## Abstract Malicious attacks against critical infrastructures, and power systems as well, became a key‐concern in recent years. The attacks may be both β€œphysical,” directed towards system components, and β€œcyber,” against the information/communication system; simultaneous attacks to different compo

[Lecture Notes in Computer Science] Cryp
✍ Walter, Colin D.; KoΓ§, Γ‡etin K.; Paar, Christof πŸ“‚ Article πŸ“… 2003 πŸ› Springer Berlin Heidelberg 🌐 German βš– 957 KB

This Book Constitutes The Refereed Proceedings Of The 5th International Workshop On Cryptographic Hardware And Embedded Systems, Ches 2003, Held In Cologne, Germany In September 2003. The 32 Revised Full Papers Presented Were Carefully Reviewed And Selected From 111 Submissions. The Papers Are Organ