This talk illustrates the everyday challenges met by embedded security practitioners by five real examples. All the examples were actually encountered while designing, developing or evaluating commercial products. This note, which is not a refereed research paper, presents the details of one of these five examples. It is intended to help the audience follow that part of our presentation. © International Association for Cryptologic Research 2006.
CITATION STYLE
Gratzer, V., & Naccache, D. (2006). Alien vs. quine, the vanishing circuit and other tales from the industry’s crypt. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4004 LNCS, pp. 48–58). Springer Verlag. https://doi.org/10.1007/11761679_4
Mendeley helps you to discover research relevant for your work.