Filter your results
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.160-174, ⟨10.1007/978-3-642-21040-2_11⟩
Conference papers
hal-01573303v1
|
||
|
Can code polymorphism limit information leakage?5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers
hal-01110259v1
|