Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1979271 - MaRDI portal

scientific article; zbMATH DE number 1979271

From MaRDI portal
Publication:4425683

zbMath1019.68581MaRDI QIDQ4425683

Sergei P. Skorobogatov, Ross Anderson

Publication date: 11 September 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2523/25230002.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (26)

Fault attack on the balanced shrinking generatorDifferential fault based key recovery attacks on TRIADAmplifying Side-Channel Attacks with Techniques from Block Cipher CryptanalysisOn the structural weakness of the GGHN stream cipherPhotonic side-channel analysis of arbiter PUFsRotational Cryptanalysis of Round-Reduced KeccakConstruction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphersFault attacks on hyperelliptic curve discrete logarithm problem over binary fieldStatistical Fault Attacks on Nonce-Based Authenticated Encryption SchemesFault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidatesPractical non-malleable codes from symmetric-key primitives in 2-split-state modelFault analysis of the NTRUSign digital signature schemeFault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptographyDesigning reliable algorithms in unreliable memoriesGlitch and laser fault attacks onto a secure AES implementation on a SRAM-based FPGAFault-based attack on Montgomery's ladder algorithmFault attacks on nonce-based authenticated encryption: application to Keyak and KetjeАнализ шифра Кузнечик методом искаженийFault Analysis of Grain-128 by Targeting NFSRDifferential Fault Analysis of SosemanukTamper-Proof Circuits: How to Trade Leakage for Tamper-ResilienceEquidistribution among cosets of elliptic curve points in intervalsSorting and searching in faulty memoriesThe price of resiliency: a case study on sorting with memory faultsAn Improved Fault Based Attack of the Advanced Encryption StandardOptimal resilient sorting and searching in the presence of memory faults






This page was built for publication: