Sciweavers

21 search results - page 5 / 5
» Vulnerability analysis for crypto devices against probing at...
Sort
View
ASIACRYPT
2003
Springer
13 years 10 months ago
The Insecurity of Esign in Practical Implementations
Provable security usually makes the assumption that a source of perfectly random and secret data is available. However, in practical applications, and especially when smart cards a...
Pierre-Alain Fouque, Nick Howgrave-Graham, Gwena&e...