Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
704
search results - page 12 / 141
»
A Practical Attack on KeeLoq
Sort
relevance
views
votes
recent
update
View
thumb
title
19
click to vote
SP
2006
IEEE
88
views
Security Privacy
»
more
SP 2006
»
Practical Attacks on Proximity Identification Systems (Short Paper)
14 years 3 months ago
Download
www.rfidblog.org.uk
Gerhard P. Hancke
claim paper
Read More »
21
click to vote
IWDW
2005
Springer
85
views
Image Processing
»
more
IWDW 2005
»
Practical Data-Hiding: Additive Attacks Performance Analysis
14 years 3 months ago
Download
vision.unige.ch
José-Emilio Vila-Forcén, Sviatoslav ...
claim paper
Read More »
22
click to vote
EUROCRYPT
2010
Springer
162
views
Cryptology
»
more
EUROCRYPT 2010
»
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
14 years 2 months ago
Download
crypto.rd.francetelecom.com
Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitr...
claim paper
Read More »
23
click to vote
CARDIS
1998
Springer
85
views
Hardware
»
more
CARDIS 1998
»
A Practical Implementation of the Timing Attack
14 years 1 months ago
Download
www.cs.jhu.edu
Jean-François Dhem, François Koeune,...
claim paper
Read More »
22
click to vote
FDTC
2008
Springer
106
views
Cryptology
»
more
FDTC 2008
»
A Practical Fault Attack on Square and Multiply
13 years 11 months ago
Download
conferenze.dei.polimi.it
Jörn-Marc Schmidt, Christoph Herbst
claim paper
Read More »
« Prev
« First
page 12 / 141
Last »
Next »