نتایج جستجو برای: random key representation

تعداد نتایج: 1030562  

2007
Nevine Maurice Ebeid

It is essential to secure the implementation of cryptosystems in embedded devices agains side-channel attacks. Namely, in order to resist differential (DPA) attacks, randomization techniques should be employed to decorrelate the data processed by the device from secret key parts resulting in the value of this data. Among the countermeasures that appeared in the literature were those that result...

Journal: :Proceedings of the American Mathematical Society 2017

Journal: :Stochastic Processes and their Applications 1985

Journal: :International Journal of Advanced engineering, Management and Science 2017

Journal: :International Journal for Numerical and Analytical Methods in Geomechanics 2011

Journal: :Pacific Journal of Mathematics 1998

Journal: :Communications in Mathematical Physics 2010

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید