Login / Signup
Prolog to "Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures".
Jim Esch
Published in:
Proc. IEEE (2012)
Keyphrases
</>
countermeasures
information security
sql injection
injection attacks
differential power analysis
smart card
power analysis
java card
real world
expert systems
recommender systems
distributed systems
lightweight
data sharing