The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for DPA with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1974-2000 (20) 2001-2002 (24) 2003 (19) 2004 (31) 2005 (39) 2006 (39) 2007 (46) 2008 (99) 2009 (31) 2010 (23) 2011 (19) 2012 (17) 2013 (19) 2014 (29) 2015 (30) 2016-2017 (34) 2018-2019 (24) 2020-2021 (19) 2022-2023 (19) 2024 (4)
Publication types (Num. hits)
article(147) incollection(1) inproceedings(433) phdthesis(3) proceedings(1)
Venues (Conferences, Journals, ...)
CHES(76) Euro-Par Workshops(51) IACR Cryptol. ePrint Arch.(41) CT-RSA(16) ISCAS(16) CoRR(10) WISA(10) HOST(9) DATE(8) ICISC(8) IEICE Trans. Fundam. Electron....(8) PATMOS(8) INDOCRYPT(7) ACISP(6) CARDIS(6) COSADE(6) More (+10 of total 203)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 576 occurrences of 189 keywords

Results
Found 585 publication records. Showing 585 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Osman Kocar DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
18Konrad J. Kulikowski, Mark G. Karpovsky, Alexander Taubin DPA on Faulty Cryptographic Hardware and Countermeasures. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Dong-Wook Lee, Dong-Soo Har An Area Efficient Approach to Design Self-Timed Cryptosystems Combatting DPA Attack. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2005 DBLP  BibTeX  RDF
18Claude Carlet On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version). Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
18 A New Approach to Counteract DPA Attacks on Block Ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
18Peter Schumacher Usability für mobile Dienste. Nutzerstudie zu einem MMS-Dienst der dpa infocom zur Fußball-Berichterstattung. Search on Bibsonomy i-com The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Frank K. Gürkaynak, Stephan Oetiker, Hubert Kaeslin, Norbert Felber, Wolfgang Fichtner Improving DPA security by using globally-asynchronous locally-synchronous systems. Search on Bibsonomy ESSCIRC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Jong Hoon Shin, Dong Jin Park, Pil Joong Lee DPA Attack on the Improved Ha-Moon Algorithm. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Ha-Moon algorithm, randomized exponentiation algorithm, side-channel attack
18Zeynep Toprak Deniz, Yusuf Leblebici Low-power current mode logic for improved DPA-resistance in embedded systems. Search on Bibsonomy ISCAS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Dong Jin Park, Pil Joong Lee A DPA Attack on the Improved Ha-Moon Algorithm. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
18Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa Random Switching Logic: A Countermeasure against DPA based on Transition Probability. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
18Hee Bong Choi, Jong-Gil Kim, Sang-Yun Han, Mung-Gil Choi, Chun-Soo Kim, Hyoon Jae Lee DPA Methods of Smart Cards. Search on Bibsonomy Security and Management The full citation details ... 2004 DBLP  BibTeX  RDF
18Marc Joye Smart-Card Implementation of Elliptic Curve Cryptography and DPA-type Attacks. Search on Bibsonomy CARDIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Kris Tiri, Ingrid Verbauwhede Charge recycling sense amplifier based logic: securing low power security ICs against DPA [differential power analysis]. Search on Bibsonomy ESSCIRC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18François-Xavier Standaert, Siddika Berna Örs, Bart Preneel Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure? Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Nigel Wildish, Marcus Turle Case Report: Mirror image: DPA first as supermodel Campbell sues newspaper over photographs. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Patrick Rakers, Larry Connell, Tim Collins, Dan Russell Secure contactless smartcard ASIC with DPA protection. Search on Bibsonomy IEEE J. Solid State Circuits The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Patrick Rakers, Larry Connell, Tim Collins, Dan Russell Secure contactless smartcard ASIC with DPA protection. Search on Bibsonomy CICC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18Peter Rissling Softwarekonzept für dezentralisierte prozessnahe Automatisierungseinrichtungen insbesondere für das dezentralisierte prozessnahe Automatisierungsgerätesystem DPA 02. Search on Bibsonomy 1989   RDF
18Jan van Leeuwen, Carl H. Smith An Improved Bound for Detecting Looping Configurations in Deterministic DPA's. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 1974 DBLP  DOI  BibTeX  RDF
17Rafael Iankowski Soares, Ney Laert Vilar Calazans, Fernando Gehm Moraes, Philippe Maurine, Lionel Torres A Robust Architectural Approach for Cryptographic Algorithms Using GALS Pipelines. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF cryptography attacks, DPA, asynchronous, SCA, GALS, design and test, DEMA
17Guido Marco Bertoni, Luca Breveglieri, Alessandro Cominola, Filippo Melzani, Ruggero Susella Practical Power Analysis Attacks to RSA on a Large IP Portfolio SoC. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptography, RSA, side channel attacks, DPA, power analysis attack
17Ilya Kizhvatov Side channel analysis of AVR XMEGA crypto engine. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptography, DPA, side channel analysis
17Thanh-Ha Le, Cécile Canovas, Jessy Clédière An overview of side channel analysis attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF side channel attacks, stochastic model, DPA, DEMA, CPA, template attack
17David Canright, Lejla Batina A Very Compact "Perfectly Masked" S-Box for AES. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF composite Galois field, AES, DPA, S-box, masking
17Rafael Soares, Ney Laert Vilar Calazans, Victor Lomné, Philippe Maurine, Lionel Torres, Michel Robert Evaluating the robustness of secure triple track logic through prototyping. Search on Bibsonomy SBCCI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF logic style, FPGA, side-channel attacks, DPA, DES, CPA
17Svetla Nikova, Vincent Rijmen, Martin Schläffer Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF non-linear functions, Noekeon, DPA, sharing, S-box, masking, glitches
17Andrey Bogdanov, Ilya Kizhvatov, Andrei Pyshkin Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multiple-differential collision attacks, ternary voting, AES, Side-channel attacks, DPA, collision attacks, algebraic cryptanalysis
17Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre An Integrated Validation Environment for Differential Power Analysis. Search on Bibsonomy DELTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure chips, Validation, DPA
17Andrey Bogdanov Multiple-Differential Side-Channel Collision Attacks on AES. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multiple-differential collision attacks, AES, collision detection, side-channel attacks, DPA
17Stefan Tillich, Christoph Herbst, Stefan Mangard Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software countermeasures, implementation security, Advanced Encryption Standard, side-channel attacks, DPA, power analysis, instruction set extensions
17Colin D. Walter Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RSA, DPA, power analysis, SPA, Side channel leakage
17Michael Hutter, Stefan Mangard, Martin Feldhofer Power and EM Attacks on Passive 13.56 MHz RFID Devices. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF EM Attacks, RFID, AES, Side-Channel Attacks, DPA, Power Analysis, DEMA
17Colin D. Walter, David Samyde Data Dependent Power Use in Multipliers. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 2005 DBLP  DOI  BibTeX  RDF EMA, smart card, Differential power analysis, DPA, multiplication, multiplier, RSA cryptosystem
17Jerry den Hartog, Erik P. de Vink Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2004 DBLP  DOI  BibTeX  RDF systematic hardening, simulation, side-channel attack, DPA, power analysis, smartcard, countermeasures, fault analysis
16Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre Evaluation of Resistance to Differential Power Analysis: Execution Time Optimizations for Designers. Search on Bibsonomy DELTA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF DPA Robustness Evaluation, Design of secure devices
16Laurent Sauvage, Maxime Nassar, Sylvain Guilley, Florent Flament, Jean-Luc Danger, Yves Mathieu DPL on Stratix II FPGA: What to Expect?. Search on Bibsonomy ReConFig The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Dual-rail with Precharge Logic (DPL), Wave Dynamic Differential Logic (WDDL), Field Programmable Gates Array (FPGA), Differential Power Analysis (DPA), Commercial Off-The-Shelf (COTS), Side-Channel Analysis (SCA)
16Thomas Popp, Stefan Mangard, Elisabeth Oswald Power Analysis Attacks and Countermeasures. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DPA-resistant logic styles, countermeasures, power analysis attacks
16Kerstin Lemke-Rust, Christof Paar Gaussian Mixture Models for Higher-Order Side Channel Analysis. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Higher-Order Analysis, Boolean Masking, Second-Order DPA, EM Algorithm, Gaussian Mixture Models, Templates, Side Channel Cryptanalysis
12Zhimin Chen 0002, Syed Haider, Patrick Schaumont Side-Channel Leakage in Masked Circuits Caused by Higher-Order Circuit Effects. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Thomas Plos Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Deta-ched Power Supply, Parasitic Backscatter, RFID, Differential Power Analysis, Side-Channel Analysis, UHF
12Kuan Jen Lin, Yi Tang Chiu, Shan Chien Fang Design Optimization and Automation for Secure Cryptographic Circuits. Search on Bibsonomy VLSI Design The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Kay C. Wiese, Alain Deschênes, Andrew Hendriks RnaPredict-An Evolutionary Algorithm for RNA Secondary Structure Prediction. Search on Bibsonomy IEEE ACM Trans. Comput. Biol. Bioinform. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RnaPredict, Evolutionary Computation, RNA Secondary Structure Prediction
12Giovanni Iachello, Gregory D. Abowd From privacy methods to a privacy toolbox: Evaluation shows that heuristics are complementary. Search on Bibsonomy ACM Trans. Comput. Hum. Interact. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF proportionality, Privacy, ubiquitous computing, requirements analysis, design methods, risk analysis, social issues
12Leonardo de Mello Honório, Michael Vidigal, Luiz E. Souza Dynamic Polymorphic Agents Scheduling and Execution Using Artificial Immune Systems. Search on Bibsonomy ICARIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Polymorphic Agent, IA Planning, multi-agent systems, Aspect-Oriented Program (AOP), Artificial Immune Systems (AIS)
12Limin Fan, Yongbin Zhou, Dengguo Feng A Fast Implementation of Computing the Transparency Order of S-Boxes. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Huiyun Li, Keke Wu, Bo Peng, Yiwei Zhang, Xinjian Zheng, Fengqi Yu Enhanced Correlation Power Analysis Attack on Smart Card. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Jude Angelo Ambrose, Sri Parameswaran, Aleksandar Ignjatovic MUTE-AES: a multiprocessor architecture to prevent power analysis based side channel attack of the AES algorithm. Search on Bibsonomy ICCAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Marcel Medwed, Elisabeth Oswald Template Attacks on ECDSA. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane, Renaud Pacalet Silicon-level Solutions to Counteract Passive and Active Attacks. Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Ashur Rafiev, Julian P. Murphy, Danil Sokolov, Alexandre Yakovlev Conversion driven design of binary to mixed radix circuits. Search on Bibsonomy ICCD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12François-Xavier Standaert, Benedikt Gierlichs, Ingrid Verbauwhede Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Koustav Bhattacharya, Nagarajan Ranganathan A linear programming formulation for security-aware gate sizing. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dynamic power variance, linear programming., path balancing, differential power analysis, gate sizing
12Amir Khatib Zadeh, Catherine H. Gebotys Enhanced Current-Balanced Logic (ECBL): An Area Efficient Solution to Secure Smart Cards against Differential Power Attack. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Iana Siomina, Di Yuan 0001 Automated planning of CPICH power allocation for enhancing HSDPA performance at cell edges. Search on Bibsonomy Mobility Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF high speed downlink packet access, pilot power, optimization, performance
12Jude Angelo Ambrose, Roshan G. Ragel, Sri Parameswaran A smart random code injection to mask power analysis based side channel attacks. Search on Bibsonomy CODES+ISSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF random instruction injection, signture identification, side channel attack, power analysis, cross correlation
12Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury Design of a Differential Power Analysis Resistant Masked AES S-Box. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Stefan Tillich, Johann Großschädl Power Analysis Resistant AES Implementation with Instruction Set Extensions. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF embedded RISC processor, SPARC V8 architecture, SCA resistance, Advanced Encryption Standard, power analysis, instruction set extensions
12Bruno Robisson, Pascal Manet Differential Behavioral Analysis. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Differential Behavioral Analysis, Safe-Error, Block Ciphers, AES, Differential Power Analysis, Fault Attacks
12Bruno Janvier, Eric Bruno, Thierry Pun, Stéphane Marchand-Maillet Information-theoretic temporal segmentation of video and applications: multiscale keyframes selection and shot boundaries detection. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Content-based video analysis, Detection of shot boundaries, Keyframe selection, Temporal segmentation
12Jacques J. A. Fournier, Michael Tunstall Cache Based Power Analysis Attacks on AES. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Kay C. Wiese, Andrew Hendriks, Alain Deschênes Analysis of Thermodynamic Models and Performance in RnaPredict - An Evolutionary Algorithm for RNA Folding. Search on Bibsonomy CIBCB The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Sung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon, JaeCheol Ha Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cryptography, Smart card, Side-channel attack, Simple power analysis (SPA), Chosen-message attack
12Kris Tiri, Ingrid Verbauwhede A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs. Search on Bibsonomy DATE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Elisabeth Oswald, Kai Schramm An Efficient Masking Scheme for AES Software Implementations. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Marco Bucci, Raimondo Luzzi, Michele Guglielmo, Alessandro Trifiletti A countermeasure against differential power analysis based on random delay insertion. Search on Bibsonomy ISCAS (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau Countermeasures for Preventing Comb Method Against SCA Attacks. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF comb method, pre-computed table, memory space, side channel attacks, Elliptic curve, scalar multiplication
12Dan Page, Martijn Stam On XTR and Side-Channel Analysis. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF LUC, finite field, side channel attack, power analysis, XTR
12Sylvain Guilley, Philippe Hoogvorst, Yves Mathieu, Renaud Pacalet, Jean Provost CMOS Structures Suitable for Secured Hardware. Search on Bibsonomy DATE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Chae Hoon Lim A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Benoît Chevallier-Mames Self-Randomized Exponentiation Algorithms. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF internal collisions, AES, side channel attacks, birthday paradox
12Jean-Claude Bajard, Laurent Imbert, Pierre-Yvan Liardet, Yannick Teglia Leak Resistant Arithmetic. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RNS Montgomery multiplication, Side channel attacks, residue number systems
12Sang Gyoo Sim, Dong Jin Park, Pil Joong Lee New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Ha-Moon algorithm, MIST algorithm, randomized exponentiation algorithm, power analysis
12Anton Kargl, Götz Wiesend On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Nigel P. Smart An Analysis of Goubin's Refined Power Analysis Attack. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Régis Bevan, Erik Knudsen Ways to Enhance Differential Power Analysis. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12James Irwin, Dan Page, Nigel P. Smart Instruction Stream Mutation for Non-Deterministic Processors. Search on Bibsonomy ASAP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Mehdi-Laurent Akkar, Christophe Giraud 0001 An Implementation of DES and AES, Secure against Some Attacks. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Jean-Sébastien Coron, Louis Goubin On Boolean and Arithmetic Masking against Differential Power Analysis. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Physical attacks, Masking Techniques, AES, Differential Power Analysis, Smartcards, IDEA, Electric consumption
12Volker Walter 0001 Comparison of the Potential of Different Sensors for an Automatic Approach for Change Detection in GIS Databases. Search on Bibsonomy Integrated Spatial Databases The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
12Ian Glaister, Jeffrey O. Shallit Automaticity III: Polynomial Automaticity and Context-Free Languages. Search on Bibsonomy Comput. Complex. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF finite automata, nondeterminism, Automaticity
12Ian Glaister, Jeffrey O. Shallit Polynomial Automaticity, Context-Free Languages, and Fixed Points of Morphism (Extended Abstract). Search on Bibsonomy MFCS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
12John L. Gustafson Reevaluating Amdahl's Law. Search on Bibsonomy Commun. ACM The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #585 of 585 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license