From post

Electromagnetic Analysis Enhancement with Signal Processing Techniques (Poster).

, , и . ACISP, том 6812 из Lecture Notes in Computer Science, стр. 456-461. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Tsunoo, Yukiyasu
add a person with the name Tsunoo, Yukiyasu
 

Другие публикации лиц с тем же именем

A smaller and faster variant of RSM., , , и . DATE, стр. 1-6. European Design and Automation Association, (2014)Expanding Weak PRF with Small Key Size., и . ICISC, том 3935 из Lecture Notes in Computer Science, стр. 284-298. Springer, (2005)Correlation Power Analysis Based on Switching Glitch Model., , , и . WISA, том 6513 из Lecture Notes in Computer Science, стр. 191-205. Springer, (2010)Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext., , и . CRYPTO, том 839 из Lecture Notes in Computer Science, стр. 369-382. Springer, (1994)Cryptanalysis of DES Implemented on Computers with Cache., , , , и . CHES, том 2779 из Lecture Notes in Computer Science, стр. 62-76. Springer, (2003)Scheme overcoming incompatibility of privacy and utilization of personal data., , , , , , , и . ISITA, стр. 727-730. IEEE, (2012)Impossible Differential Cryptanalysis of CLEFIA., , , , , и . FSE, том 5086 из Lecture Notes in Computer Science, стр. 398-411. Springer, (2008)Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations., и . FSE, том 4047 из Lecture Notes in Computer Science, стр. 226-241. Springer, (2006)Privacy Preserving Data Processing with Collaboration of Homomorphic Cryptosystems., , , , , и . Financial Cryptography Workshops, том 7862 из Lecture Notes in Computer Science, стр. 201-212. Springer, (2013)Higher Order Differential Attacks on Reduced-Round MISTY1., , , и . ICISC, том 5461 из Lecture Notes in Computer Science, стр. 415-431. Springer, (2008)