Login / Signup
A Comparison of Computer-Based Technologies Suitable for Cryptographic Attacks.
Victor Gayoso Martínez
Luis Hernández Encinas
Agustín Martín Muñoz
Óscar Martínez-Graullera
Javier Villazón-Terrazas
Published in:
SOCO-CISIS-ICEUTE (2016)
Keyphrases
</>
security protocols
cryptographic protocols
differential power analysis
smart card
support systems
security threats
malicious attacks
terrorist attacks
stream cipher
cryptographic algorithms
chosen plaintext
web intelligence
st century
watermarking algorithm