메뉴 건너뛰기




Volumn 1174, Issue , 1996, Pages 317-333

Tamper resistant software: An implementation

(1)  Aucsmith, David a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84955621400     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-61996-8_49     Document Type: Conference Paper
Times cited : (211)

References (2)
  • 1
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Crypotsystems
    • Feb
    • Rivest, R., Shamir, A., and Adleman, L. A Method for Obtaining Digital Signatures and Public-Key Crypotsystems. Communications of the ACM, vol. 21, issue 2, Feb. 1978, pp. 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 2
    • 84955598038 scopus 로고
    • Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using Timing Attacks
    • December
    • Kocher, P. Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using Timing Attacks. Private Extended Abstract, 7 December 1995.
    • (1995) Private Extended Abstract , vol.7
    • Kocher, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.