Theoretical treatments of physical attacks have recently attracted the attention of the cryptographic community, as witnessed by various publications, e.g., [1, 17, 22, 24, 29, 31, 33, 34, 42]. These works consider adversaries enhanced with abilities such as inserting faults during a computation or monitoring side-channel leakages.
CITATION STYLE
Standaert, F. X., Pereira, O., Yu, Y., Quisquater, J. J., Yung, M., & Oswald, E. (2010). Leakage resilient cryptography in practice. In Information Security and Cryptography (Vol. 0, pp. 99–134). Springer International Publishing. https://doi.org/10.1007/978-3-642-14452-3_5
Mendeley helps you to discover research relevant for your work.