Sciweavers

Share
2 search results - page 1 / 1
» Secure Hardware Implementation of Non-linear Functions in th...
Sort
View
ICISC
2008
113views Cryptology» more  ICISC 2008»
11 years 8 months ago
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
Hardware implementations of cryptographic algorithms are still vulnerable to side-channel attacks. Side-channel attacks that are based on multiple measurements of the same operatio...
Svetla Nikova, Vincent Rijmen, Martin Schläff...
SIGOPSE
1998
ACM
11 years 10 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau
books