Sciweavers

FC   2010 International Conference on Financial Cryptography
Wall of Fame | Most Viewed FC-2010 Paper
FC
2010
Springer
260views Cryptology» more  FC 2010»
14 years 16 days ago
Lightweight Cryptography and DPA Countermeasures: A Survey
Abstract. The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full contr...
Amir Moradi, Axel Poschmann
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source260
2Download preprint from source230
3Download preprint from source226
4Download preprint from source209
5Download preprint from source205
6Download preprint from source196
7Download preprint from source196
8Download preprint from source196
9Download preprint from source194
10Download preprint from source191
11Download preprint from source188
12Download preprint from source183
13Download preprint from source181
14Download preprint from source180
15Download preprint from source177
16Download preprint from source176
17Download preprint from source175
18Download preprint from source173
19Download preprint from source171
20Download preprint from source169
21Download preprint from source166
22Download preprint from source166
23Download preprint from source164
24Download preprint from source163
25Download preprint from source160
26Download preprint from source159
27Download preprint from source158
28Download preprint from source157
29Download preprint from source155
30Download preprint from source153
31Download preprint from source150
32Download preprint from source145
33Download preprint from source141
34Download preprint from source140
35Download preprint from source135
36Download preprint from source132