Refine
Departments, institutes and facilities
Document Type
- Conference Object (13)
- Part of a Book (1)
Language
- English (14)
Has Fulltext
- no (14)
Keywords
- Basic Access Control (2)
- Boolean Masking (2)
- DPA (2)
- E-Passport (2)
- MRTD (2)
- Power Analysis (2)
- Side Channel Cryptanalysis (2)
- Stochastic Model (2)
- Template Attack (2)
- AMD Family 15h (1)
- Adversarial Model (1)
- Authorship watermark (1)
- Biometrics (1)
- Boolean and arithmetic operations (1)
- COPACOBANA (1)
- CPUID instruction (1)
- Cache-independent (1)
- Covert channel (1)
- Cross-core (1)
- DEMA (1)
- DES (1)
- Differential Side Channel Cryptanalysis (1)
- Digital watermarking (1)
- EM Algorithm (1)
- Electromagnetic Analysis (1)
- FPGA implementation (1)
- Fault analysis (1)
- Fingerprint watermark (1)
- Gaussian Mixture Models (1)
- HMAC-construction (1)
- High-Order Attacks (1)
- Higher-Order Analysis (1)
- Higher-Order Side Channel Analysis (1)
- IDEA (1)
- IP protection (1)
- Implementation Attack (1)
- Information hiding (1)
- Instruction scheduling (1)
- Key Search Machine (1)
- MRTD Cracker (1)
- Maximum Likelihood Principle (1)
- Minimum Principle (1)
- Multithreaded and multicore architecture (1)
- Multivariate Side Channel Analysis (1)
- Performance Analysis (1)
- Physical Security (1)
- Privacy (1)
- RC6 (1)
- RF Eavesdropper (1)
- SHA-1 (1)
- Second-Order DPA (1)
- Side Channel Cryptanalysis, Stochastic Methods (1)
- Side-channel analysis (1)
- Tamper-Proof Hardware (1)
- Tampering (1)
- Templates (1)
- Timing analysis (1)
- Timing channel (1)
- embedded systems (1)
Physical Attacks
(2005)