Filter your results
- 4
- 4
- 4
- 2
- 4
- 5
- 5
- 3
- 4
- 3
- 2
- 5
- 3
- 8
- 3
- 4
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.82-97, ⟨10.1007/978-3-642-38530-8_6⟩
Conference papers
hal-01485935v1
|
||
|
Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.155-167
Conference papers
hal-01506564v1
|
||
|
Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.168-179
Conference papers
hal-01506561v1
|
||
|
Modular Architecture for Adaptable Signature-Creation Tools12th International Conference on Electronic Government (EGOV), Sep 2013, Koblenz, Germany. pp.274-285, ⟨10.1007/978-3-642-40358-3_23⟩
Conference papers
hal-01490913v1
|