-
1
-
-
3042690263
-
The em-side channel(s)
-
CHES
-
Agrawal, D., Archambeault, B., Rao, J., and Rohtagi, P. The em-side channel(s). Workshop on Cryptographic Hardware and Embedded Systems, CHES 2002.
-
(2002)
Workshop on Cryptographic Hardware and Embedded Systems
-
-
Agrawal, D.1
Archambeault, B.2
Rao, J.3
Rohtagi, P.4
-
5
-
-
0002796489
-
Noisy polynomial interpolation and noisy Chinese remaindering
-
EUROCRYPT
-
Bleichenbacher, D., and Nguyen, P. Q. Noisy polynomial interpolation and noisy chinese remaindering. Advances in Cryptology, EUROCRYPT 2000.
-
(2000)
Advances in Cryptology
-
-
Bleichenbacher, D.1
Nguyen, P.Q.2
-
9
-
-
0026491010
-
Physics of granular states
-
Jaeger, H., and Nagel, S. Physics of granular states. Science 255, 1524 (1992).
-
(1992)
Science
, vol.255
, pp. 1524
-
-
Jaeger, H.1
Nagel, S.2
-
12
-
-
0001297528
-
Timing attacks on implementations of di e-helmman, rsa, dss, and other systems
-
CRYPTO
-
Kocher, P. Timing attacks on implementations of di e-helmman, rsa, dss, and other systems. Advances in Cryptology, CRYPTO 1996.
-
(1996)
Advances in Cryptology
-
-
Kocher, P.1
-
15
-
-
85093467807
-
Design principles for tamper-resistant smartcard processors
-
USENIX
-
Kummerling, O., and Kuhn, M. Design principles for tamper-resistant smartcard processors. Workshop on Smartcard Technology, USENIX 1999.
-
(1999)
Workshop on Smartcard Technology
-
-
Kummerling, O.1
Kuhn, M.2
-
16
-
-
84969380579
-
Enhancing sesamev4 with smart cards
-
CARDIS
-
Looi, M., Ashley, P., Seet, L. T., Au, R., and Vandenwauver, M. Enhancing sesamev4 with smart cards. International Conference on Smartcard Research and Applications, CARDIS 1998.
-
(1998)
International Conference on Smartcard Research and Applications
-
-
Looi, M.1
Ashley, P.2
Seet, L.T.3
Au, R.4
Vandenwauver, M.5
-
17
-
-
84937740421
-
Shift register synthesis and bch decoding
-
Massey, J. L. Shift register synthesis and bch decoding. IEEE Transactions on Information Theory 15, 1 (1969), 122-127.
-
(1969)
IEEE Transactions on Information Theory
, vol.15
, Issue.1
, pp. 122-127
-
-
Massey, J.L.1
-
20
-
-
84939144804
-
Development of a mathematical formula for the calculation of ngerprint probabilities based on individual characteristics
-
Osterberg, J., Parthasarathy, T., Raghavan, T., and Sclove, S. Development of a mathematical formula for the calculation of ngerprint probabilities based on individual characteristics. Journal of the American Statistical Association 72 (1977), 772-778.
-
(1977)
Journal of the American Statistical Association
, vol.72
, pp. 772-778
-
-
Osterberg, J.1
Parthasarathy, T.2
Raghavan, T.3
Sclove, S.4
-
21
-
-
0036685857
-
On the individuality of ngerprints
-
Pankanti, S., Prabhakar, S., and Jain, A. On the individuality of ngerprints. IEEE Transactions on PAMI 24 (2002), 1010-1025.
-
(2002)
IEEE Transactions on PAMI
, vol.24
, pp. 1010-1025
-
-
Pankanti, S.1
Prabhakar, S.2
Jain, A.3
-
22
-
-
84950609498
-
The occurance of ngerprint characteristics as a two-dimensional process
-
Sclove, S. The occurance of ngerprint characteristics as a two-dimensional process. Journal of the American Statistical Association 74 (1979), 588-595.
-
(1979)
Journal of the American Statistical Association
, vol.74
, pp. 588-595
-
-
Sclove, S.1
-
24
-
-
85058052888
-
Overview of authentication protocols: Kerberos and sesame
-
Vandenwauver, M., Govaerts, R., and Vandewalle, J. Overview of authentication protocols: Kerberos and sesame. IEEE Carnahan Conference on Security Technology 1997, pp. 108-113.
-
(1997)
IEEE Carnahan Conference on Security Technology
, pp. 108-113
-
-
Vandenwauver, M.1
Govaerts, R.2
Vandewalle, J.3
-
25
-
-
85028630321
-
-
Verifinger. Neurotechnologija ltd. http://www.neurotechnologija.com.
-
Verifinger
-
-
-
26
-
-
85084164692
-
Ssh secure login connections over the internet
-
USENIX
-
Ylonen, T. Ssh secure login connections over the internet. Security Symposium, USENIX 1996, pp. 37-42.
-
(1996)
Security Symposium
, pp. 37-42
-
-
Ylonen, T.1
|