Cited By
View all- Nikova SRechberger CRijmen V(2022)Threshold Implementations Against Side-Channel Attacks and GlitchesInformation and Communications Security10.1007/11935308_38(529-545)Online publication date: 10-Mar-2022
- Ouladj MGuilley SProuff E(2020)On the Implementation Efficiency of Linear Regression-Based Side-Channel AttacksConstructive Side-Channel Analysis and Secure Design10.1007/978-3-030-68773-1_8(147-172)Online publication date: 1-Apr-2020
- Wang YHa Y(2017)A DFA-Resistant and Masked PRESENT with Area Optimization for RFID ApplicationsACM Transactions on Embedded Computing Systems10.1145/303554316:4(1-22)Online publication date: 28-Jul-2017
- Show More Cited By