Login / Signup
Attacks on the HKM/HFX Cryptosystem.
Xuejia Lai
Rainer A. Rueppel
Published in:
FSE (1996)
Keyphrases
</>
power analysis
cellular automata
countermeasures
elliptic curve
watermarking scheme
java card
malicious attacks
traffic analysis
scalar multiplication
terrorist attacks
chosen plaintext
data sets
public key cryptosystem
malicious users
attack detection
security threats
ddos attacks
intrusion detection