Language
English
German
^M
Dutch
Spanish
Title:
Side-Channel Attack Using Meet-in-the-Middle Technique
Source:
Computer Journal [0010-4620] Kim, J yr:2009
Basic
Sorry, no full text available...
Please use the document delivery service (see below)
Holding information
Holdings in library search engine
ALBERT
Document delivery
Request document via
Library/Bibliothek
Users interested in this article also expressed an interest in the following:
description
1.
Salmasizadeh, Amir T.
"Charge recovery logic as a side channel attack countermeasure."
2009 10th International Symposium on Quality of Electronic Design
2009. 686-691.
description
2.
Li, Y.
"New fault-based side-channel attack using fault sensitivity."
IEEE Transactions on Information Forensics and Security
7.1 (2012): 88-97.
description
3.
Wang, X.
"Protecting infrastructure networks from cost-based attacks."
New journal of physics
11.3 (2009): 1-.
description
4.
Gammel, Berndt M.
"On the Duality of Probing and Fault Attacks."
Journal of electronic testing
26.4 (2010): 483-493.
description
5.
"Analysis of Network Security Policy - Based Management."
International journal of computer science and information security.
11.3: 143-146.
description
6.
Tiri, K.
"Side-Channel Attack Pitfalls."
DESIGN AUTOMATION CONFERENCE
15-20.
description
7.
Alioto, M.
"Leakage Power Analysis Attacks: A Novel Class of Attacks to Nanometer Cryptographic Circuits."
IEEE transactions on circuits and systems. I, Regular papers
57.2 (2010): 355-.
description
8.
Heys, HM.
"Linearly weak keys of RC5."
Electronics letters
33.10 (1997): 836-838.
description
9.
Wang, X.
"Efficient Network Security Policy Enforcement With Policy Space Analysis."
IEEE/ACM transactions on networking a joint publication of the IEEE Communications Society, the IEEE Computer Society, and the ACM with its Special Interest Group on Data Communication.
24.5: 2926-2938.
description
10.
Wenxue Tan, Wenxue T.
"A mechanism of quantitating the security strength of RSA key."
2010 Third International Symposium on Electronic Commerce and Security
2010. 357-361.
description
11.
Pathari, V.
"Identifying linkages between statements in information security policy, procedures and controls."
Information Management & Computer Security
20.4 (2012): 264-280.
description
12.
Ramaswamy, V.
"Performance Analysis of Blowfish and its Modified Version using Encryption quality, Key sensitivity, Histogram and Correlation coefficient analysis."
International Journal of Recent Trends in Engineering
1.2 (2009): 1-.
description
13.
Ruedinger, J.
"The complexity of DPA type side channel attacks and their dependency on the algorithm design."
Information security technical report
11.3 (2006): 154-158.
View More...
View Less...
Select All
Clear All
Save Citations
Select Format
EndNote
RefWorks
Reference Manager
ProCite
Submit citation export
Advanced
Author
Other articles by this author? -- in
GeoRef
author:
Kim, J
Hong, S
last name
initials
Other articles by this author? -- in
Online Contents Geosciences
author:
Kim, J
Hong, S
last name
initials
Other articles by this author? -- using
Web of Science
author:
Kim, J
Hong, S
last name
initials
Web Search
Find related information in
a Web Search Engine
Excite
Google
HotBot
Ixquick
ZOO
Ask
Yahoo!
Bing
Naver
Search Terms:
Search for related information in
Google Scholar
Article Title
Author Name
Journal Title
Other Search
Search Terms:
A service provided by the
Library of the Wissenschaftspark Albert Einstein
, Potsdam, Germany.
© 2005 SFX by Ex Libris Inc.