Cited By
View all- Regazzoni FIenne PFanucci LTeich J(2016)Instruction set extensions for secure applicationsProceedings of the 2016 Conference on Design, Automation & Test in Europe10.5555/2971808.2972165(1529-1534)Online publication date: 14-Mar-2016
- Bossuet LGrand MGaspar LFischer VGogniat G(2013)Architectures of flexible symmetric key crypto engines—a surveyACM Computing Surveys10.1145/2501654.250165545:4(1-32)Online publication date: 30-Aug-2013
- Groß HPlos T(2012)On using instruction-set extensions for minimizing the hardware-implementation costs of symmetric-key algorithms on a low-resource microcontrollerProceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues10.1007/978-3-642-36140-1_11(149-164)Online publication date: 2-Jul-2012
- Show More Cited By