Inproceedings,

When Should an Implementation Attack Be Viewed as Successful?

.
Number Theory and Cryptography, volume 8260 of Lecture Notes in Computer Science, page 139-150. Springer, (2013)

Meta data

Tags

Users

  • @dblp

Comments and Reviews