共 50 条
- [21] Timing Analysis in Software and Hardware to Implement NIST Elliptic Curves over Prime Fields 2013 IEEE 56TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2013, : 1358 - 1362
- [22] Agent Protection based on the use of cryptographic hardware 2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, : 985 - 990
- [23] A solution based on cryptographic hardware to protect agents Proceedings - 13th International Conference on Network-Based Information Systems, NBiS 2010, 2010, : 400 - 407
- [24] Fault-based Attacks on Cryptographic Hardware PROCEEDINGS OF THE 2013 IEEE 16TH INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS & SYSTEMS (DDECS), 2013, : 12 - 17
- [25] Evolutionary RSA-based cryptographic hardware using the co-design methodology INNOVATIONS IN APPLIED ARTIFICIAL INTELLIGENCE, 2004, 3029 : 351 - 360
- [26] Designing a Code Generator for Pairing Based Cryptographic Functions PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010, 2010, 6487 : 207 - 224
- [28] Hardware Trojan Design and Its Detection using Side-Channel Analysis on Cryptographic Hardware AES Implemented on FPGA PROCEEDING OF 2019 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI), 2019, : 191 - 196
- [29] Research on Power Analysis Against Software-based and Hardware-based Cryptographic Circuits INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 10 - 18
- [30] Efficient cryptographic hardware using the co-design methodology ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 508 - 512