Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/birthday/Schindler13
%A Schindler, Werner
%B Number Theory and Cryptography
%D 2013
%E Fischlin, Marc
%E Katzenbeisser, Stefan
%I Springer
%K dblp
%P 139-150
%T When Should an Implementation Attack Be Viewed as Successful?
%U http://dblp.uni-trier.de/db/conf/birthday/buchmann2013.html#Schindler13
%V 8260
%@ 978-3-642-42000-9
@inproceedings{conf/birthday/Schindler13,
added-at = {2017-05-23T00:00:00.000+0200},
author = {Schindler, Werner},
biburl = {https://www.bibsonomy.org/bibtex/2733343340bdc455445276ae541819b8c/dblp},
booktitle = {Number Theory and Cryptography},
crossref = {conf/birthday/2013buchmann},
editor = {Fischlin, Marc and Katzenbeisser, Stefan},
ee = {https://doi.org/10.1007/978-3-642-42001-6_11},
interhash = {6d8678e9661d0f5886c88cfdee0e716d},
intrahash = {733343340bdc455445276ae541819b8c},
isbn = {978-3-642-42000-9},
keywords = {dblp},
pages = {139-150},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2019-05-15T12:19:42.000+0200},
title = {When Should an Implementation Attack Be Viewed as Successful?},
url = {http://dblp.uni-trier.de/db/conf/birthday/buchmann2013.html#Schindler13},
volume = 8260,
year = 2013
}