Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis
IEEE Transactions on Computers
Proceedings of the 38th annual Design Automation Conference
IEEE Transactions on Computers
Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
Secure ad hoc on-demand distance vector routing
ACM SIGMOBILE Mobile Computing and Communications Review
On m-Permutation Protection Scheme Against Modification Attack
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
White-Box Cryptography and an AES Implementation
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Differential Fault Attacks on Elliptic Curve Cryptosystems
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
In How Many Ways Can You Write Rijndael?
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Practice-Oriented Provable Security
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Serpent: A New Block Cipher Proposal
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
Securing the AES Finalists Against Power Analysis Attacks
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
NESSIE: A European Approach to Evaluate Cryptographic Algorithms
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Evaluating Differential Fault Analysis of Unknown Cryptosystems
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Power Analysis Attacks of Modular Exponentiation in Smartcards
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Probing Attacks on Tamper-Resistant Devices
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
IPA: A New Class of Power Attacks
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
A DPA Attack against the Modular Reduction within a CRT Implementation of RSA
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis
IEEE Transactions on Computers
An Investigation into the Security of Self-Timed Circuits
ASYNC '03 Proceedings of the 9th International Symposium on Asynchronous Circuits and Systems
Proceedings of the conference on Design, automation and test in Europe - Volume 1
Emerging challenges in designing secure mobile appliances
Ambient intelligence
A Fault-Injection Attack on Fiat-Shamir Cryptosystems
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Memories: A Survey of Their Secure Uses in Smart Cards
SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
ACM Transactions on Embedded Computing Systems (TECS)
Security on FPGAs: State-of-the-art implementations and attacks
ACM Transactions on Embedded Computing Systems (TECS)
Securing Mobile Appliances: New Challenges for the System Designer
DATE '03 Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults
Designs, Codes and Cryptography
Asynchronous circuits transient faults sensitivity evaluation
Proceedings of the 42nd annual Design Automation Conference
Concurrent Error Detection in a Polynomial Basis Multiplier over GF(2m)
Journal of Electronic Testing: Theory and Applications
Simple Error Detection Methods for Hardware Implementation of Advanced Encryption Standard
IEEE Transactions on Computers
Key management and delayed verification for ad hoc networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
A cryptography core tolerant to DFA fault attacks
SBCCI '06 Proceedings of the 19th annual symposium on Integrated circuits and systems design
Designing Resistant Circuits against Malicious Faults Injection Using Asynchronous Logic
IEEE Transactions on Computers
On two DES implementations secure against differential power analysis in smart-cards
Information and Computation
Robust codes and robust, fault-tolerant architectures of the Advanced Encryption Standard
Journal of Systems Architecture: the EUROMICRO Journal
A fast pipelined multi-mode DES architecture operating in IP representation
Integration, the VLSI Journal
On the implementation of the advanced encryption standard on a public-key crypto-coprocessor
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
Security analysis of a cryptographically-enabled RFID device
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Authenticating secure tokens using slow memory access
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Investigations of power analysis attacks on smartcards
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Breaking up is hard to do: modeling security threats for smart cards
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Securing Scan Control in Crypto Chips
Journal of Electronic Testing: Theory and Applications
Securing Designs against Scan-Based Side-Channel Attacks
IEEE Transactions on Dependable and Secure Computing
Sequential Circuit Design for Embedded Cryptographic Applications Resilient to Adversarial Faults
IEEE Transactions on Computers
The security of the Fiat--Shamir scheme in the presence of transient hardware faults
ACM Transactions on Embedded Computing Systems (TECS)
Differential fault analysis on the ARIA algorithm
Information Sciences: an International Journal
Error detection and error correction procedures for the advanced encryption standard
Designs, Codes and Cryptography
Secret External Encodings Do Not Prevent Transient Fault Analysis
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Differential Behavioral Analysis
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Fault Attacks on Public Key Elements: Application to DLP-Based Schemes
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Coping with Outside-the-Box Attacks
CAV '08 Proceedings of the 20th international conference on Computer Aided Verification
High-Performance Concurrent Error Detection Scheme for AES Hardware
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Perturbating RSA Public Keys: An Improved Attack
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
DSA Signature Scheme Immune to the Fault Cryptanalysis
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Improved Related-key Attacks on DESX and DESX+
Cryptologia
A New Attack on the LEX Stream Cipher
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Differential fault analysis on the contracting UFN structure, with application to SMS4 and MacGuffin
Journal of Systems and Software
Differential Capacitance Analysis
Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation
An EDA tool for implementation of low power and secure crypto-chips
Computers and Electrical Engineering
Logic-Level Analysis of Fault Attacks and a Cost-Effective Countermeasure Design
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation
Information Security Applications
Novel PUF-Based Error Detection Methods in Finite State Machines
Information Security and Cryptology --- ICISC 2008
Transactions on Computational Science IV
A Leakage-Resilient Mode of Operation
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
An Improved Fault Based Attack of the Advanced Encryption Standard
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Differential Fault Analysis on DES Middle Rounds
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
Automatic detection of fault attack and countermeasures
WESS '09 Proceedings of the 4th Workshop on Embedded Systems Security
A compact ASIC implementation of the advanced encryption standard with concurrent error detection
CSS '07 Proceedings of the Fifth IASTED International Conference on Circuits, Signals and Systems
Concurrent error detection architectures for Gaussian normal basis multiplication over GF(2m)
Integration, the VLSI Journal
Fault Analysis of Rabbit: Toward a Secret Key Leakage
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Non-linear Error Detection for Finite State Machines
Information Security Applications
On the security of RFID devices against implementation attacks
International Journal of Security and Networks
Differential fault analysis on Camellia
Journal of Systems and Software
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Differential fault analysis on AES key schedule and some countermeasures
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Permanent fault attack on the parameters of RSA with CRT
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Enhanced doubling attacks on signed-all-bits set recoding
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
An embedded system for practical security analysis of contactless smartcards
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Hardware fault attack on RSA with CRT revisited
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Differential fault analysis on CLEFIA
ICICS'07 Proceedings of the 9th international conference on Information and communications security
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Attack model for verification of interval security properties for smart card C codes
PLAS '10 Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security
On the Duality of Probing and Fault Attacks
Journal of Electronic Testing: Theory and Applications
Design and implementation of robust embedded processor for cryptographic applications
Proceedings of the 3rd international conference on Security of information and networks
Countering early evaluation: an approach towards robust dual-rail precharge logic
WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
Survey: leakage resilience and the bounded retrieval model
ICITS'09 Proceedings of the 4th international conference on Information theoretic security
Pseudorandom functions and permutations provably secure against related-key attacks
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
Differential fault analysis of LEX
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Algorithmic tamper-proof security under probing attacks
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
A general power model of differential power analysis attacks to static logic circuits
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Differential Fault Analysis on SMS4 using a single fault
Information Processing Letters
Side-channel analysis of the K2 stream cipher
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
A new and extended fault analysis on RSA
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Building a side channel based disassembler
Transactions on computational science X
Achieving leakage resilience through dual system encryption
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Proceedings of the forty-third annual ACM symposium on Theory of computing
FIRE: fault injection for reverse engineering
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Fault analysis of grain-128 by targeting NFSR
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Differential fault analysis of Sosemanuk
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
An improved differential fault analysis on AES-256
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Journal of Network and Computer Applications
Cryptography with tamperable and leaky memory
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
Meet-in-the-middle and impossible differential fault analysis on AES
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
On the power of fault sensitivity analysis and collision side-channel attacks in a combined setting
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Design and characterisation of an AES chip embedding countermeasures
International Journal of Intelligent Engineering Informatics
Amplifying side-channel attacks with techniques from block cipher cryptanalysis
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Fault attack on the DVB common scrambling algorithm
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Impossible fault analysis of RC4 and differential fault analysis of RC4
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
A generalized method of differential fault attack against AES cryptosystem
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Read-proof hardware from protective coatings
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Attacking right-to-left modular exponentiation with timely random faults
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
Cryptanalysis of two protocols for RSA with CRT based on fault infection
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
Fault based collision attacks on AES
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
An adversarial model for fault analysis against low-cost cryptographic devices
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
Cryptographic key reliable lifetimes: bounding the risk of key exposure in the presence of faults
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
A comparative cost/security analysis of fault attack countermeasures
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
Fault attack resistant cryptographic hardware with uniform error detection
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
Fault analysis of DPA-Resistant algorithms
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
Experimenting with faults, lattices and the DSA
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
A tutorial on physical security and side-channel attacks
Foundations of Security Analysis and Design III
Side channel cryptanalysis on SEED
WISA'04 Proceedings of the 5th international conference on Information Security Applications
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
Classifying public key certificates
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
An open approach for designing secure electronic immobilizers
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Synchronization fault cryptanalysis for breaking a5/1
WEA'05 Proceedings of the 4th international conference on Experimental and Efficient Algorithms
Designs, Codes and Cryptography
Differential fault analysis of HC-128
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Fresh re-keying: security against side-channel and fault attacks for low-cost devices
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Physical security bounds against tampering
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Private circuits II: keeping secrets in tamperable circuits
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Language modeling and encryption on packet switched networks
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Unrolling cryptographic circuits: a simple countermeasure against side-channel attacks
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Designing a side channel resistant random number generator
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
Improved fault analysis of signature schemes
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
When clocks fail: on critical paths and clock faults
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
Leakage resilient strong key-insulated signatures in public channel
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Hardware trojans for inducing or amplifying side-channel leakage of cryptographic software
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
The physically observable security of signature schemes
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Fault attacks on combiners with memory
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Cryptography secure against related-key attacks and tampering
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
BiTR: built-in tamper resilience
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Secret key leakage from public key perturbation of DLP-Based cryptosystems
Cryptography and Security
Differential fault analysis of AES-128 key schedule using a single multi-byte fault
CARDIS'11 Proceedings of the 10th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Combined fault and side-channel attack on protected implementations of AES
CARDIS'11 Proceedings of the 10th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Java card operand stack: fault attacks, combined attacks and countermeasures
CARDIS'11 Proceedings of the 10th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Fault analysis of the NTRUSign digital signature scheme
Cryptography and Communications
Differential fault analysis of AES: Toward reducing number of faults
Information Sciences: an International Journal
Fault analysis of the KATAN family of block ciphers
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Differential fault analysis of ARIA in multi-byte fault models
Journal of Systems and Software
Distributed public key schemes secure against continual leakage
PODC '12 Proceedings of the 2012 ACM symposium on Principles of distributed computing
Differential fault analysis of full LBlock
COSADE'12 Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design
Public key encryption against related key attacks
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Linear fault analysis of block ciphers
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Fault detection of the macguffin cipher against differential fault attack
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
An automatic design flow for implementation of side channel attacks resistant crypto-chips
PATMOS'07 Proceedings of the 17th international conference on Integrated Circuit and System Design: power and timing modeling, optimization and simulation
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
Hard fault analysis of Trivium
Information Sciences: an International Journal
RKA security beyond the linear barrier: IBE, encryption and signatures
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Error detecting AES using polynomial residue number systems
Microprocessors & Microsystems
From Cryptography to Hardware: Analyzing Embedded Xilinx BRAM for Cryptographic Applications
MICROW '12 Proceedings of the 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops
Fault analysis study of the block cipher FOX64
Multimedia Tools and Applications
ACM Transactions on Information and System Security (TISSEC)
Side channel vulnerability metrics: the promise and the pitfalls
Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy
OAKE: a new family of implicitly authenticated diffie-hellman protocols
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Attacks on implementations of cryptographic algorithms: side-channel and fault attacks
Proceedings of the 6th International Conference on Security of Information and Networks
Electromagnetic glitch on the AES round counter
COSADE'13 Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design
COSADE'13 Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design
On the effectiveness of the remanence decay side-channel to clone memory-based PUFs
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
A differential fault attack on MICKEY 2.0
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Journal of Information Security and Applications
Efficient leakage-resilient public key encryption from DDH assumption
Cluster Computing
A fault-resistant implementation of AES using differential bytes between input and output
The Journal of Supercomputing
Hi-index | 0.02 |