-
1
المصدر: ICM
مصطلحات موضوعية: Post-quantum cryptography, Microcontroller, Transmission (telecommunications), Computer science, business.industry, Overhead (computing), Wireless, Cryptography, Sample (statistics), business, Algorithm, Computer Science::Cryptography and Security, Quantum computer
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::78ac8ac69cf92e9c6735266b4b92d7cb
https://doi.org/10.1109/icm48031.2019.9021842 -
2
المؤلفون: Mostafa Taha, Xin Ye, Cong Chen, Thomas Eisenbarth
المصدر: TrustED@CCS
مصطلحات موضوعية: Side channel countermeasures, Theoretical computer science, Computational complexity theory, Efficient algorithm, Computer science, Computation, Information leakage, Algorithm, Analysis method, Leakage (electronics), Exponential function
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::3ff7216d8ac4eeb2ec71a8bace5433ff
https://doi.org/10.1145/2808414.2808419 -
3
المؤلفون: Bilgiday Yuce, Nahid Farhady Ghalaty, Mostafa Taha, Patrick Schaumont
المصدر: FDTC
مصطلحات موضوعية: Stuck-at fault, Power analysis, Differential fault analysis, Computer science, Real-time computing, Fault coverage, Byte, Hardware_PERFORMANCEANDRELIABILITY, Fault injection, Algorithm, Statistical hypothesis testing, Fault indicator
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::21d72f4130f776066c045f9f55ba6989
https://doi.org/10.1109/fdtc.2014.15 -
4
المؤلفون: Patrick Schaumont, Mostafa Taha
المصدر: HOST
مصطلحات موضوعية: MicroBlaze, Theoretical computer science, business.industry, Computer science, Hash function, Key (cryptography), Cryptography, Message authentication code, Side channel attack, Hash-based message authentication code, business, Block size, Algorithm
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::bd0a22bfbd4377f029fefff15342d93f
https://doi.org/10.1109/hst.2013.6581577