ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
44
views
0
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,599
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Cryptographic Hardware and Embedded Systems - CHES 2009
other
Editor(s):
Christophe Clavier
,
Kris Gaj
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
oa repository (via OAI-PMH doi match)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Socioecological systems
Author and book information
Book
ISBN (Print):
978-3-642-04137-2
ISBN (Electronic):
978-3-642-04138-9
Publication date (Print):
2009
DOI:
10.1007/978-3-642-04138-9
SO-VID:
d0b6e174-f4c4-4485-844d-78d21f77bdb2
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Faster and Timing-Attack Resistant AES-GCM
pp. 81
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure
pp. 97
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
pp. 156
An Efficient Method for Random Delay Generation in Embedded Software
pp. 272
KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
pp. 317
The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators
pp. 348
CDs Have Fingerprints Too
pp. 382
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering
pp. 429
Mutual Information Analysis: How, When and Why?
Similar content
3,599
Les differentes modalites de la reproduction ches les mollusques bivalves
Authors:
P. Lubet
,
R. MANN
,
R. Mann
Le totésisme ches les Fân: Collection Internationale de Monographies Ethnographiques Bibliot
Authors:
R. Trilles
La producción de notations ches le Jeune enfant
Authors:
J Banberger
,
H. SINCLAIR
,
H Sinclair
See all similar
Cited by
1
Improved Conditional Differential Analysis on NLFSR-Based Block Cipher KATAN32 with MILP
Authors:
Zhaohui Xing
,
Wenying Zhang
,
Guoyong Han
…
See all cited by