Search
Now showing items 1-5 of 5
Chosen-message electromagnetic analysis against cryptographic software on embedded OS
Publisher: IEEE
Year: 2014
Efficient method for estimating propagation area of information leakage via EM field
Publisher: IEEE
Year: 2014
Integrated-circuit countermeasures against information leakage through EM radiation
Publisher: IEEE
Year: 2014
Precisely timed IEMI fault injection synchronized with EM information leakage
Publisher: IEEE
Year: 2014
Correlation power analysis using bit-level biased activity plaintexts against AES cores with countermeasures
Publisher: IEEE
Year: 2014