Sciweavers

141
Voted
FC
2010
Springer
260views Cryptology» more  FC 2010»
15 years 1 days ago
Lightweight Cryptography and DPA Countermeasures: A Survey
Abstract. The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full contr...
Amir Moradi, Axel Poschmann