Fault Attack Protection and Evaluation
- 12 April 2020
- book chapter
- other
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 39 references indexed in Scilit:
- An Almost-Linear-Time Algorithm for Approximate Max Flow in Undirected Graphs, and its Multicommodity GeneralizationsPublished by Society for Industrial & Applied Mathematics (SIAM) ,2013
- Hardware-Based Public-Key Cryptography with Public Physically Unclonable FunctionsLecture Notes in Computer Science, 2009
- A Differential Fault Attack Against Early Rounds of (Triple-)DESLecture Notes in Computer Science, 2004
- Differential Fault Analysis on AES Key Schedule and Some CountermeasuresLecture Notes in Computer Science, 2003
- A CMOS continuous-time G/sub m/-C filter for PRML read channel applications at 150 Mb/s and beyondIEEE Journal of Solid-State Circuits, 1997
- A new approach to the maximum-flow problemJournal of the ACM, 1988
- Signal Delay in General RC NetworksIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 1984
- The maximum flow problem is log space complete for PTheoretical Computer Science, 1982
- An O(n2log n) parallel max-flow algorithmJournal of Algorithms, 1982
- Binary codes with specified minimum distanceIEEE Transactions on Information Theory, 1960