Leakage resilient cryptography in practice

61Citations
Citations of this article
47Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Theoretical treatments of physical attacks have recently attracted the attention of the cryptographic community, as witnessed by various publications, e.g., [1, 17, 22, 24, 29, 31, 33, 34, 42]. These works consider adversaries enhanced with abilities such as inserting faults during a computation or monitoring side-channel leakages.

Cite

CITATION STYLE

APA

Standaert, F. X., Pereira, O., Yu, Y., Quisquater, J. J., Yung, M., & Oswald, E. (2010). Leakage resilient cryptography in practice. In Information Security and Cryptography (Vol. 0, pp. 99–134). Springer International Publishing. https://doi.org/10.1007/978-3-642-14452-3_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free