ExLibris header image
SFX Logo
Title: Side-Channel Attack Using Meet-in-the-Middle Technique
Source:

Computer Journal [0010-4620] Kim, J yr:2009


Collapse list of basic services Basic
Sorry, no full text available...
Please use the document delivery service (see below)  
Holding information
Holdings in library search engine ALBERT GO
Document delivery
Request document via Library/Bibliothek GO
Users interested in this article also expressed an interest in the following:
1. Salmasizadeh, Amir T. "Charge recovery logic as a side channel attack countermeasure." 2009 10th International Symposium on Quality of Electronic Design 2009. 686-691. Link to Full Text for this item Link to SFX for this item
2. Li, Y. "New fault-based side-channel attack using fault sensitivity." IEEE Transactions on Information Forensics and Security 7.1 (2012): 88-97. Link to Full Text for this item Link to SFX for this item
3. Wang, X. "Protecting infrastructure networks from cost-based attacks." New journal of physics 11.3 (2009): 1-. Link to Full Text for this item Link to SFX for this item
4. Gammel, Berndt M. "On the Duality of Probing and Fault Attacks." Journal of electronic testing 26.4 (2010): 483-493. Link to SFX for this item
5. "Analysis of Network Security Policy - Based Management." International journal of computer science and information security. 11.3: 143-146. Link to SFX for this item
6. Tiri, K. "Side-Channel Attack Pitfalls." DESIGN AUTOMATION CONFERENCE 15-20. Link to SFX for this item
7. Alioto, M. "Leakage Power Analysis Attacks: A Novel Class of Attacks to Nanometer Cryptographic Circuits." IEEE transactions on circuits and systems. I, Regular papers 57.2 (2010): 355-. Link to Full Text for this item Link to SFX for this item
8. Heys, HM. "Linearly weak keys of RC5." Electronics letters 33.10 (1997): 836-838. Link to SFX for this item
9. Wang, X. "Efficient Network Security Policy Enforcement With Policy Space Analysis." IEEE/ACM transactions on networking a joint publication of the IEEE Communications Society, the IEEE Computer Society, and the ACM with its Special Interest Group on Data Communication. 24.5: 2926-2938. Link to SFX for this item
10. Wenxue Tan, Wenxue T. "A mechanism of quantitating the security strength of RSA key." 2010 Third International Symposium on Electronic Commerce and Security 2010. 357-361. Link to Full Text for this item Link to SFX for this item
11. Pathari, V. "Identifying linkages between statements in information security policy, procedures and controls." Information Management & Computer Security 20.4 (2012): 264-280. Link to SFX for this item
12. Ramaswamy, V. "Performance Analysis of Blowfish and its Modified Version using Encryption quality, Key sensitivity, Histogram and Correlation coefficient analysis." International Journal of Recent Trends in Engineering 1.2 (2009): 1-. Link to SFX for this item
13. Ruedinger, J. "The complexity of DPA type side channel attacks and their dependency on the algorithm design." Information security technical report 11.3 (2006): 154-158. Link to SFX for this item
View More...
View Less...
Select All Clear All

Expand list of advanced services Advanced