Sciweavers

84
Voted
ISQED
2010
IEEE
156views Hardware» more  ISQED 2010»
15 years 4 days ago
On the design of different concurrent EDC schemes for S-Box and GF(p)
Recent studies have shown that an attacker can retrieve confidential information from cryptographic hardware (e.g. the secret key) by introducing internal faults. A secure and re...
Jimson Mathew, Hafizur Rahaman, Abusaleh M. Jabir,...